V.S. Subrahmanian

About me

V.S. Subrahmanian is the Walter P. Murphy Professor of Computer Science at the McCormick School of Engineering, Northwestern University and Buffett Faculty Fellow at the Northwestern Roberta Buffett Institute for Global Affairs. He is also the head of the Northwestern Security and AI Laboratory (NSAIL). Prior to this, Subrahmanian was The Dartmouth College Distinguished Professor in Cybersecurity, Technology, and Society at Dartmouth College with tenure in the Computer Science Department and Director of the Institute for Security, Technology and Society (ISTS). Prior to joining Dartmouth, he was a tenured Professor in the University of Maryland's Computer Science Department.He served a 6.5 year stint as Director of the University of Maryland's Institute for Advanced Computer Studies where he co-founded the Lab for Computational Cultural Dynamics and founded the Center for Digital International Government. His work stands squarely at the intersection of data-driven AI for increased security, policy, and business needs. Prof. Subrahmanian has been an invited speaker at the United Nations, Capitol Hill, the Mumbai Stock Exchange, and numerous other prestigious forums.



Prof. Subrahmanian is one of the world leaders in artificial intelligence including logical reasoning with uncertainty, probabilistic logics, temporal probabilistic logics, and managing huge, heterogeneous databases with incomplete and inconsistent information, and multimedia databases. In recent years, he has developed scalable methods to apply probabilistic models to a wide variety of real-world scenarios. He created the field of computational cultural dynamics with a suite of novel methods to analyze the behaviors of terrorist groups and applied them to making forecasts and suggesting policies to shape behaviors of groups like Hezbollah, Lashkar-e-Taiba, Indian Mujahideen, and Boko Haram. These methods have since been applied to a variety of problems including predicting the stability of nations, predicting when protests will turn violent, predicting systemic banking crises in countries, predicting if a cyber-vulnerability will be exploited, how severe it will be, and when the exploit might happen, predicting spread of malware in countries, and more. In combination with social network analysis, these methods have also been used to identify bad actors on social media, forecast diffusion in social media, and suggest methods to influence social networks. Prof. Subrahmanian led the team that won DARPA's Twitter Influence Bot Detection Challenge under their SMISC program and was a member of the team that won the NIMH-funded Harvard Med School/SUNY Albany NGRID Challenge to automatically quantify the intensity of psychological symptoms in clinical notes. Prof. Subrahmanian is one of the world leaders in the design, analysis, and application of big data analytics to real world problems so that optimal decisions can be made by governments and companies. In cyber-security, Prof. Subrahmanian developed some of the first secure query processing algorithms, flexible authentication frameworks, unexplained behavior detection and scalable detection of known threats. His Global Cyber-Vulnerability Report published in January, 2016, characterizes the cyber-risk of 44 countries by studying data across 44 hosts per year and over 20 Billion telemetry and malware reports.



In addition to his academic work, Prof. Subrahmanian has served for 2 years (2013, 2014) on the US-India Strategic Dialog (track 2), the India-Israel track 2 forum (2013, 2014), the US Air Force Science Advisory Board, and DARPA”s Executive Advisory Council on their Advanced Logistics Program. He serves currently on the Research Advisory Board of Tata Consultancy Services (India’s biggest software firm and the Board of Directors of Sentimetrix, Inc., a big data analytics firm. He previously served on the board of), the Board of Directors of the Development Gateway (created by the World Bank in 1999). He serves or has served on the boards of numerous journals including Science, ACM Transactions on Intelligent Systems & Technology, ACM Transactions on Computational Logic, and IEEE Transactions on Computational Social Systems.

Appointments


Academic Appointments

Northwestern University (Sept 2021–Present)

Walter P. Murphy Professor of Computer Science - McCormick School of Engineering, 9/21 to Present

Northwestern Buffet Faculty Fellow - Northwestern Roberta Buffett Institute of Global Affairs, 9/21 to Present



Dartmouth College (Aug 1 2017–Aug 2021)

The Dartmouth College Distinguished Professor in Cybersecurity, Technology, and Society, 8/17 to 8/21

Professor (with tenure), Computer Science Dept., 8/17 to 8/21



University of Maryland College Park

Professor (with tenure), CS Dept. 7/00 to 7/17

Associate Professor (with tenure), CS Dept., 8/95 to 6/00

Assistant Professor, CS Dept., 8/95 to 6/00



Administrative Appointments

Director, U. Md. Inst. for Advanced Computer Studies, 10/04 to 6/10

Interim Director, U. Md. Inst. for Advanced Computer Studies, 02/04 to 09/04

Director, Center for Digital International Government 10/05 to 7/17

Director, Lab for Computational Cultural Dynamics 2007 to 7/17



Other Positions

Plumer Fellow, Oxford University, 1 month: June-July 2008

Institut de Recherche en Informatique de Toulouse, 4 months: Apr-July 2006



Educational Background

PhD, Computer Science, Syracuse University, 1989

M.S., Computer Science, Syracuse University, 1987

M.Sc. (Tech.) Computer Science, Birla Inst. of Tech. and Sci., India, 1985

Research


Past Major Research Accomplishments (Collaboratively With Students and Colleagues) Include:

Ongoing Work:

Publications


Books Authored

  1. Q. Han, S. Mandujano, S. Porst, V.S. Subrahmanian, S. Tetali, and Y. Xiong. The Android Malware Handbook Detection and Analysis by Human and Machine, NoStarch Press, Expected to be published in Nov 2023. https://nostarch.com/androidmalwaredetection

  2. V.S. Subrahmanian, C. Pulice, J. Brown and J. Bonen-Clark. A Machine Learning Model of Boko Haram, Springer, in press, expected to be published by Jan 2021, Springer

  3. V.S. Subrahmanian, M. Ovelgonne, T. Dumitras, and B. A. Prakash. The Global Cyber-Vulnerability Report, Springer, Dec 2015. Foreword by Gen. (Ret.) Isaac Ben-Israel, Founding Head of the National Cyber-Bureau (Israel) in the Prime Minister’s Office.

  4. Austin Parker, Gerardo I. Simari, Amy Sliva, V.S. Subrahmanian: Data-driven Generation of Policies. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4939-0273-6

  5. V.S. Subrahmanian, A. Mannes, A. Roul, and R.K. Raghavan. Indian Mujahideen: Computational Analysis and Public Policy, Springer, November 2013. Foreword by the Hon. Louis J. Freeh, former Director of the FBI. Also re-published as a special Indian edition. ISBN 978-3-319-02818-7

  6. V. Martinez, C. Molinaro, V.S. Subrahmanian, L. Amgoud. A General Framework for Reasoning on Inconsistency, Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-6750-2.

  7. V.S. Subrahmanian, A. Mannes, A. Sliva, J. Shakarian and J. Dickerson. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, August 2012, Springer, Switzerland. Foreword by James R. Woolsey, former Director of the Central Intelligence Agency. Also re-published as a special Indian edition. ISBN 978-1-4614-4769-6

  8. P. Shakarian and V.S. Subrahmanian. Geospatial Abduction: Principles and Practice, Springer, Nov. 2011. Foreword by LTG (Ret) Charles Otstott. ISBN 978-1-4614-1794-1

  9. V.S. Subrahmanian, P. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan and R. Ross. "Heterogeneous Agent Systems: Theory and Implementation", MIT Press, June 2000. ISBN 026-2-19436-8

Books Edited

  1. V.S. Subrahmanian, J. Burgoon and N. Dunbar. (eds) Detecting Trust and Deception in Group Interaction, Springer, Feb 2021.

  2. S. Jajodia, G. Cybenko, V.S. Subrahmanian, V. Swarup, C. Wang, and M. Wellman. (eds). Adaptive, Autonomous, Secure, Cyber Systems, Springer, 2020

  3. S. Jajodia, V.S. Subrahmanian, V. Swarup, C. Wang (eds). Cyber-Deception: Building the Scientific Foundation, Springer , 2016.

  4. S. Jajodia, P. Shakarian, V.S. Subrahmanian, V. Swarup, C. Wang (eds). Cyber-Warfare: Building the Scientific Foundation, Springer 2015. Also released as Chinese student edition in 2016.

  5. W. Liu, V.S. Subrahmanian and J. Wijsen. Proceedings 2013 International Conference on Scalable Uncertainty Management, Springer Lecture Notes in Computer Science, Vol. 8068, Sep 2013.

  6. S. Alpern, R. Fokkink, L. Gasieniec, R. Lindelauf, V.S. Subrahmanian (eds.) Search Theory: A Game-Theoretic Perspective, Springer, May 2013, 311 pages.

  7. Moving Target Defense II (eds. S. Jajodia, A.K. Ghosh, Subrahmanian, V.S., Swarup, V., Wang, C., Wang, X.S.), Springer, September 2012. Also released in 2014 as a special Chinese edition.

  8. Handbook of Computational Approaches to Counter-Terrorism (ed. V.S. Subrahmanian), Springer, 2013, 578 pages.

  9. Proceedings of the 2nd International Conference on Computational Cultural Dynamics (eds. V.S. Subrahmanian and A. Kruglanski), AAAI Press, Sep. 2008. ISBN 978-1-57735-389-8 (book), 978-1-57735-390-4 (CD).

  10. Editor, Special Issue of Annals of Mathematics and Artificial Intelligence Journal celebrating Jack Minker’s 80th birthday, Vol. 51, Nos. 2—4, Dec. 2007.

  11. Editor (with H. Prade). Proceedings – 2007 International Conference on Scalable Uncertainty Management, Springer-Verlag Lecture Notes in Computer Science, Volume 4772, October 2007, Springer-Verlag, Heidelberg.

  12. Guest editor, Multimedia Tools and Applications Journal, 2004

  13. Guest editor, Journal of Logic Programming, Vol. 43, No. 1, April 2000. (with R. Ramakrishnan).

  14. Multimedia Database Systems: Research Issues and Directions, (V.S. Subrahmanian and S. Jajodia, eds.), Springer Verlag, Nov. 1995. Reprinted as a Chinese Student Edition, 1998.

  15. Multimedia Information Systems, V.S. Subrahmanian and S. Tripathi (eds.). Kluwer, July 1998.

  16. Guest editor, ACM/Springer Multimedia Systems Journal, Vol. 6, Jan. 1998. (with S. Tripathi).

  17. Guest editor, Multimedia Tools and Applications Journal, Vol. 7, Nr. 1/2, 1998. (with S. Tripathi).

  18. Guest editor, Annals of Math and Artificial Intelligence, special issue on "Logic in Databases", Vol. 19, Nos. 1-2, 1997. (with D. Pedreschi)

  19. Guest editor, Intl. Journal of Methods of Logic in Computer Science, special issue on Nonmonotonic Logic Programming, 1994. (with W. Marek and A. Nerode)

  20. Proc. of the First International Workshop on Logic Programming and Non-Monotonic Reasoning, (A. Nerode, W. Marek and V.S. Subrahmanian, eds.), MIT Press, July 1991.

Textbooks

  1. C. Zaniolo, S. Ceri, C. Faloutsos, R. Snodgrass, V.S. Subrahmanian and R. Zicari. "Introduction to Advanced Database Systems", Morgan-Kaufmann, May 1997. (Textbook)

  2. V.S. Subrahmanian. "Principles of Multimedia Database Systems", Jan. 1998. Morgan Kaufmann. Reprinted also as an Indian student edition. ISBN 978-1-5586-0466-7

Book Chapters

  1. Li S., Kumar S., Dumitras T., Subrahmanian V.S. (2018) Breaking Bad: Forecasting Adversarial Android Bad Behavior. In: Samarati P., Ray I., Ray I. (eds) From Database to Cyber Security. Lecture Notes in Computer Science, vol 11170. Springer.

  2. J. Grant, F. Parisi, V.S. Subrahmanian. Research in Probabilistic Spatiotemporal Databases: The SPOT Framework. Advances in Probabilistic Databases for Uncertain Information Management 2013 (eds. Z. Ma and L. Yan), Springer, pp.1-22.

  3. M. Albanese, M. Fayzullin, J. Shakarian and V.S. Subrahmanian. Automated Coding of Decision Support Variables, in: Handbook on Computational Approaches to Counterterrorism, pp. 69-80, Springer 2013.

  4. A. Sliva, G. Simari, V. Martinez and V.S. Subrahmanian. SOMA: Stochastic Opponent Modeling Agents for Forecasting Violent Behavior, in: Handbook on Computational Approaches to Counterterrorism, pp. 99-127, Springer 2013.

  5. G.I. Simari, D. Earp, M.V. Martinez, A. Sliva and V.S. Subrahmanian. Forecasting Group-level Actions using Similarity Measures, in: Handbook on Computational Approaches to Counterterrorism, pp. 181-199, Springer 2013.

  6. M.V. Martinez, A. Sliva, G.I. Simari and V.S. Subrahmanian. Forecasting Changes in Terror Group Behavior, in: Handbook on Computational Approaches to Counterterrorism, pp. 225-243, Springer 2013.

  7. J.P. Dickerson, G.I. Simari and V.S. Subrahmanian. Using Temporal Probabilistic Rules to Learn Group Behavior, in: Handbook on Computational Approaches to Counterterrorism, pp. 245-266, Springer 2013.

  8. G.I. Simari, J.P. Dickerson, A. Sliva and V.S. Subrahmanian. Policy Analytics Generation Using Action Probabilistic Logic Programs, in: Handbook on Computational Approaches to Counterterrorism, pp. 515-542, Springer 2013.

  9. J. Dix, W. Faber, and V.S. Subrahmanian. Privacy Preservation Using Multi-context Systems and Default Logic. Essays on Logic-Based AI in Honour of Vladimir Lifschitz (eds. E. Erdem, J. Lee, Y. Erlier and D. Pearce), Lecture Notes in Computer Science Vol. 7265, pp. 195-210, Springer, 2012.

  10. P. Shakarian and V.S. Subrahmanian. Region-based Geospatial Abduction with Counter-IED Applications, in: Counterterrorism and Open Source Intelligence (ed. U.K. Wiil), Springer Verlag Lecture Notes on Social Networks, pp. 105-142.

  11. M. Albanese, M. Broecheler, J. Grant, V. Martinez and V.S. Subrahmanian. PLINI: A Probabilistic Logic Program Framework for Inconsistent News Information: "Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning: Essays Dedicated to Michael Gelfond on the Occasion of his 65th Birthday" (eds. S. Tran and M. Bulduccini), pp. 347-376, 2011.

  12. F. Parisi, A. Parker, J. Grant and V.S. Subrahmanian. Scaling Cautious Selection in Spatial Probabilistic Temporal Databases, accepted for publication in: Methods for Handling Imperfect Spatial Information (eds. R. Jeansoulin, O. Papini, H. Prade and S. Schockaert), Studies in Fuzziness and Soft Computing Vol. 256, pages Springer, 2011.

  13. A. Parker, D. S. Nau, and V.S. Subrahmanian. Paranoia versus overconfidence in imperfect-information games. In R. Dechter, H. Geffner, and J. Y. Halpern, editors, "Heuristics, Probabilities, and Causality: A Tribute to Judea Pearl", pp. 63–87, 2010.

  14. M. Albanese, R. Chellappa, A. Pugliese, P. Turaga, and V.S. Subrahmanian, Semantic Video Content Analysis, in "Video Search and Mining" (eds. Dan Schonfeld, Caifeng Shan, Dacheng Ta, and Liang Wang), Studies in Computational Intelligence Series, Springer Verlag, pp. 147-176, 2010.

  15. A. Sliva, V.S. Subrahmanian, V. Martinez and G. Simari. CAPE: Automatically Predicting Changes in Terror Group Behavior, in Mathematical Methods in Counterterrorism (eds. N. Memon, J. Farley et al.), Springer Verlag page 253-269, 2009.

  16. V.S. Subrahmanian. Probabilistic Temporal Databases, in Encyclopedia of Database Systems (eds. T. Ozsu and L. Liu), Springer Verlag, 2009, pp. 2165-2168.

  17. V.S. Subrahmanian, V. Martinez and D. Reforgiato. Multimedia Presentation Databases, in Encyclopedia of Database Systems (eds. T. Ozsu and L. Liu), Springer Verlag, 2009, pp. 1829-1831.

  18. R. Chellappa, N.P. Cuntoor, S.W. Joo, V.S. Subrahmanian and P. Turaga. Computational Vision Approaches for Event Modeling. In "Understanding Events: From Perception to Action", T. F. Shipley and J. Zacks (eds.), pp. 473-521, Oxford University Press, 2008.

  19. A. Parker, D. Nau and V.S. Subrahmanian. The Role of Imperfect Information, in "Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind" (eds. A. Kott and W.M. McEneaney), pp. 209—229, Chapman and Hall, 2006.

  20. M. Albanese, C. Cesarano, M. Fayzullin, A. Picariello and V.S. Subrahmanian. Video Databases, in "Encyclopedia of Multimedia" (ed. B. Furht), pp. 892-900, Springer, 2006.

  21. M. Albanese, C. Cesarano, M. Fayzullin, A. Picariello and V.S. Subrahmanian. Video Summarization, in "Encyclopedia of Multimedia" (ed. B. Furht), pp. 917-925, Springer, 2006.

  22. A. Picariello, M.L. Sapino and V.S. Subrahmanian. Algebraic Video Environment, in Handbook of Video Data Bases (e.g. B. Furht and O. Marques), CRC Press ISBN 084937006X, 2003.

  23. T. Eiter, V. Mascardi, V.S. Subrahmanian. Error-Tolerant Agents. Computational Logic: Logic Programming and Beyond (eds. A. Kakas and F. Sadri) 2002: 586-625 Springer Verlag.

  24. S. Jajodia, M. Kudo and V.S. Subrahmanian. Provisional Authorizations, in Recent Advances in Secure and Private E-Commerce (ed. A. Ghosh), Kluwer Academic Publishers, 2001.

  25. J. Lu, B. Ludascher, J. Schue and V.S. Subrahmanian. Maintaining Well-Founded Views in Constraint Databases, in Logic Programming and Soft Computing (eds. T.P. Martin and F. A. Fontana), pp. 129-144, 1998.

  26. S. Marcus and V.S. Subrahmanian. Towards a Theory of Multimedia Database Systems, in: Multimedia Database Systems: Issues and Research Directions (eds. V.S. Subrahmanian and S. Jajodia), Springer Verlag, Nov. 1995.

  27. D. Perlis and V.S. Subrahmanian. Meta-languages, Reflection Principles, and Self-Reference, in: "Handbook of Logic in Artificial Intelligence and Logic Programming", pp. 323-358, ed. Dov Gabbay, Oxford Univ. Press, 1994.

  28. R. Ng and V.S. Subrahmanian. Relating Dempster-Shafer Logic Programs and Stable Semantics, in: Logical Methods: In Honor of Anil Nerode's Sixtieth Birthday (eds. J. Crossley and J. Remmel), pp 654-704, Birkhauser, 1993.

  29. H. Blair, A. Brown and V.S. Subrahmanian. Monotone Logic Programming, in: "Intensional Logics for Programming", (eds. L. Farinas del Cerro and M. Penttonen), pp 1-22, Oxford Univ. Press, 1992.

  30. N.C.A. da Costa, L. Henschen, J. Lu and V.S. Subrahmanian. Reasoning in Paraconsistent Logics, in: "Automated Reasoning: Essays in Honor of Woody Bledsoe", pp. 181-210, ed. R. Boyer, Kluwer Academic Publishers, 1991.

  31. V.S. Subrahmanian. A Simple Formulation of the Theory of Metalogic Programming, in: "Meta-Programming in Logic Programming", (eds. H. Abramson and M. Rogers), pp 65-101. MIT Press, 1989.

Articles in Refereed Journals

  1. Y. Zhang, D. Chen, S. Jajodia, A. Pugliese, V.S. Subrahmanian, and Y. Xiong. GAIT: A Game-Theoretic Defense Against Intellectual Property Theft, accepted for publication in IEEE Transactions on Dependable & Secure Computing, July 2023.

  2. D. Byman, C. Gao, C. Meserole and V.S. Subrahmanian. The Case for a Deepfake Equities Process. Lawfare Blog (refereed), accepted May 24 2023. https://www.lawfareblog.com/case-deepfake-equities-process

  3. L. Pajola, D. Chen, M. Conti, and V.S. Subrahmanian. A Novel Review Helpfulness Measure based on the User-Review-Item Paradigm, accepted for publication in ACM Transactions on the Web, January 2023.

  4. D. Byman, C. Gao, C. Meserole and V.S. Subrahmanian. Deepfakes and International Conflict. Foreign Policy at Brookings brief. January 2023.

  5. G. Apruzzese and V.S. Subrahmanian. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors, to appear in IEEE Transactions on Dependable & Security Computing, accepted Sep 2022.

  6. R.J. Fokkink, J.F. Brethouwer, K.T. Greene, R. Lindelauf, V.S. Subrahmanian, C. Tornquist. Rising tension in the Himalayas: a Geospatial Analysis of Chinese Border Incursions into India, PloS One, 2022 Nov 10;17(11):e0274999.

  7. Y. Chen, D. Gartenstein-Ross, K. T. Greene, K. Kalif, S. Kraus, F. Parisi, C. Pulice, A. Subasic, and V.S. Subrahmanian. Linking Terrorist Network Structure to Lethality: Algorithms and Analysis, accepted for publication in IEEE Transactions on Computational Social Systems, July 2022.

  8. C. Bai, M. Bolonkin, V. Regunath and V.S. Subrahmanian. DIPS: A Dyadic Impression Prediction System for Group Interaction Videos, accepted for publication in ACM Transactions on Multimedia Computing Communications and Applications, April 2022. https://dl.acm.org/doi/pdf/10.1145/3532865

  9. C. Bai, H. Chen, J. Leskovec, S. Kumar and V.S. Subrahmanian. M2P2: Multimodal Persuasion Prediction using Adaptive Fusion, accepted for publication in IEEE Transactions on Multimedia, November 2021. https://ieeexplore.ieee.org/abstract/document/9645309?casa_token=Ll2EbvR1s1QAAAAA:tkH5dnn1FxGPJzdaJQ7_7q4DKH_FlYcRRtsNQOpIdYXs_MzPMv3nA6MlS5nNFuG68pCIl0fW

  10. H. Chen, A. Duncklee, S. Jajodia, R. Lui, S. McCormack, and V.S. Subrahmanian. PCAM: A Data-Driven Probabilistic Cyber-Alert Management Framework, ACM Transactions on Internet Technology (TOIT) 22, no. 3 (2022): 1-24. 2022. https://dl.acm.org/doi/pdf/10.1145/3511101

  11. R. Liu, K. Greene, R. Lu, M. Mandic, B. Valentino, S. Vosoughi, and V.S. Subrahmanian. Using Impression Data to Improve Models of Online Social Influence, Nature Scientific Reports (2021) 11:16613, August 2021. https://rdcu.be/ct8v2

  12. K. Greene, C. Tornquist, R. Fokkink, R. Lindelauf, and V.S. Subrahmanian. Understanding the Timing of Chinese Border Incursions into India, Humanities and Social Sciences Communications, 8, 164, July 2021. https://doi.org/10.1057/s41599-021-00843-5

  13. Q. Han, C. Molinaro, A. Picariello, G. Sperli, V.S. Subrahmanian and Y. Xiong. Generating Fake Documents using Probabilistic Logic Graphs, IEEE Transactions on Dependable & Secure Computing, 19(4): 2428-2441 (2022). https://ieeexplore.ieee.org/document/9354044

  14. Y. Xiong, G.K. Ramachandran, R. Ganesan, S. Jajodia, and V.S. Subrahmanian. Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft, IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022). https://ieeexplore.ieee.org/document/9259009

  15. D. Bellutta, Y. Chen, D. Gartenstein-Ross, C. Pulice, A. Subasic, and V.S. Subrahmanian. Understanding Shifting Triadic Relationships in the Al-Qaeda/ISIS Faction Ecosystem, IEEE Transactions on Computational Social Systems, Vol 7, Nr. 6, Dec 2020.

  16. C. Molinaro, C. Pulice, A. Subasic, A. Bartolome, and V.S. Subrahmanian. STAR: Summarizing Timed Association Rules, ACM Transactions on Data Science, Vol 2., Nr. 1, pages 1-36, 2021.

  17. A. Abdibayev, D. Chen, H. Chen, D. Poluru, and V.S. Subrahmanian. Using Word Embeddings to Deter Intellectual Property Theft Through Automated Generation of Fake Documents, ACM Transactions on Management Information Systems, Article No.: 13, pp 1–22, Feb 2021.

  18. R. Liu, A. Pugliese, and V.S. Subrahmanian. STARS: Defending Against Sockpuppet-based Targeted Attacks on Reviewing Systems, ACM Transactions on Intelligent Systems & Technology, 11(5): 56:1-56:25 (2020).

  19. Q. Han, V.S. Subrahmanian and Y. Xiong. Android Malware Detection via (Somewhat) Robust Irreversible Feature Transformations, IEEE Transactions on Information Forensics & Security, 15: 3511-3525 (2020).

  20. Chakraborty, T., Park, N., Agarwal, A. and Subrahmanian, V.S., 2020. Ensemble Detection and Analysis of Communities in Complex Networks. ACM Transactions on Data Science, 1(1), pp.1-34.

  21. F. Pierazzi, Q. Han, G. Mezzour, M. Colajanni, and V.S. Subrahmanian. A Data-Driven Analysis of Modern Android Spyware ACM Transactions on Management Information Systems, 11(1), pp.1-38, 2020.

  22. N. Park, A. Pugliese, E. Serra, and V.S. Subrahmanian. Top-k User-Specified Preferred Answers in Massive Graph Databases, Data & Knowledge Engineering journal 127 (2020): 10179.

  23. H. Chen, Q. Han, S. Jajodia, R. Lindelauf, V.S. Subrahmanian, and Y. Xiong. Disclose or Exploit? A Game Theoretic Approach to Strategic Decision Making in Cyber Warfare, IEEE Systems Journal, Vol 14, Nr 3, Sep 2020. https://ieeexplore.ieee.org/document/8967205

  24. H. Chen, M. Hajiaghayi, S. Kraus, E. Serra, V.S. Subrahmanian, and Y. Xiong. PIE: A Data-Driven Payoff Inference Engine with Counter-Terrorism Applications IEEE Transactions on Computational Social Systems, Vol. 7, Nr. 1, Feb 2020.

  25. DT. Chakraborty, F. Pierazzi, and V.S. Subrahmanian. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families IEEE Transactions on Dependable and Secure Computing, 17(2): 262-277 2020.

  26. Daveed Gartenstein-Ross, Samuel Hodgson, Daniele Bellutta, Chiara Pulice & V.S. Subrahmanian (2019) When Jihadist Factions Split: A Data-Driven Network Analysis, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2019.1680184 Oct 2019.

  27. C. Bai, Q. Han, G. Mezzour, F. Pierazzi, and V.S. Subrahmanian. DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans, IEEE Transactions on Dependable & Secure Computing, 18, no. 3 (2019): 1378-1393. 2019.

  28. S. Grover. C. Pulice, G. Simari, and V.S. Subrahmanian. BEEF: Balanced English Explanations of Forecasts, IEEE Transactions on Computational Social Systems, 6(2): 350-364 (2019), Apr 2019.

  29. T. Chakraborty, S. Jajodia, J. Katz, A. Picariello, G. Sperli, and V.S. Subrahmanian. FORGE: Fake Online Repository Generation Engine, IEEE Transactions on Dependable & Secure Computing, 18(2), pp.518-533. 2019.

  30. T. Chakraborty, N. Park, A. Agarwal, and V.S. Subrahmanian. Ensemble Detection and Analysis of Communities in Complex Networks, CM Transactions on Data Science, 1, 1, pages 1-34, Jan 2020.

  31. E. Lancaster, T. Chakraborty and V.S. Subrahmanian. MALTP: Parallel Prediction of Malicious Tweets, IEEE Transactions on Computational Social Systems, Vol 5, Nr. 4, pages 1096-1108, Dec 2018.

  32. T. Chakraborty, S. Jajodia, N. Park, A. Pugliese, E. Serra, and V.S. Subrahmanian. Hybrid Adversarial Defense: Merging Honeypots and Traditional Security Methods, Journal of Computer Security, Vol. 26, Nr. 5, pages 615-645, May 2018.

  33. F. Parisi, N. Park, A. Pugliese, and V.S. Subrahmanian. Top-k User-Defined Vertex Scoring Queries in Edge-Labeled Graph Databases, ACM Transactions on the Web, Oct 2017.

  34. S. Jajodia, N. Park, E. Serra, and V.S. Subrahmanian. SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine, accepted for publication in ACM Transactions on Internet Technology, August 2017.

  35. T. Chakraborty, F. Pierazzi, and V.S. Subrahmanian. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families, accepted for publication in IEEE Transactions on Dependable and Secure Computing, August 2017.

  36. S. Jajodia, N. Park, F. Pierazzi, A. Pugliese, E. Serra, G. Simari, and V.S. Subrahmanian. A Probabilistic Logic of Cyber Deception, accepted for publication in IEEE Transactions on Information Forensics & Security, May 2017.

  37. V.S. Subrahmanian and S. Kumar. Predicting Human Behavior: The Next Frontiers, Science, Vol. 355 (6324), p. 489. This is an one page invited essay.

  38. B. An, H. Chen, N. Park, and V.S. Subrahmanian. Data-Driven Frequency-Based Airline Profit Maximization, accepted for publication in ACM Transactions on Intelligent Systems & Technology, Vol. 8, Nr. 4, paper 61, March 2017.

  39. M. Ovelgonne, T. Dumitras, A. Prakash, V.S. Subrahmanian, and B. Wang. Understanding the Relationship between Human Behavior and Susceptibility to Cyber-Attacks: A Data-Driven Approach, ACM Transactions on Intelligent Systems & Technology, Vol. 8, Nr. 4, paper 51, March 2017.

  40. C. Kang, S. Kraus, C. Molinaro, F. Spezzano, and V.S. Subrahmanian. Diffusion Centrality in Social Networks, Artificial Intelligence, Vol. 239, pages 70-96, July 2016.

  41. S. Jajodia, N. Park, E. Serra, and V.S. Subrahmanian. Using Temporal Probabilistic Logic for Optimal Monitoring of Security Events with Limited Resources, Journal of Computer Security, vol. 24, no. 6, pp. 735-791, 2016.

  42. V.S. Subrahmanian, A. Azaria, S. Durst, V. Kagan, A. Galstyan, K. Lerman, L. Zhu, E. Ferrara, A. Flammini, F. Menczer, A. Stevens, A. Dekhtyar, S. Gao, T. Hogg, F. Kooti, Y. Liu, O. Varol, P. Shiralkar, V. Vydiswaran, Q. Mei, and T. Huang. The DARPA Twitter Bot Challenge, IEEE Computer, June 2016, pages 38-46.

  43. E. Serra, N. Park, T. Snitch and V.S. Subrahmanian. APE: A Data-Driven, Behavioral Model Based Anti-Poaching Engine, IEEE Transactions on Computational Social Systems, No. 2 (2015): 15-37.

  44. N. Park, E. Serra, and V.S. Subrahmanian. Saving Rhinos with Predictive Analytics, IEEE Intelligent Systems, Vol. 30, Nr. 4, pages 86-88, July/August 2015.

  45. A. Sawant, J. Dickerson, M. Hajiayaghi and V.S. Subrahmanian. Automated Generation of Counter-Terrorism Policies using Multi-Expert Input, ACM Transactions on Intelligent Systems & Technology, 6(4):44, 2015.

  46. V. Kagan, A. Stevens, and V.S. Subrahmanian. Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election. IEEE Intelligent Systems,pp. 2-5, Jan-Feb 2015.

  47. A. Azaria, A. Richardson, S. Kraus and V.S. Subrahmanian. Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data, IEEE Transactions on Computational Social Systems, 1.2 (2014): 135-155, November 2014.

  48. E. Serra, S. Jajodia, A. Pugliese, A. Rullo, and V.S. Subrahmanian. Pareto-Optimal Adversarial Defense of Enterprise Systems, ACM Transactions on Information & Systems Security, 17(3): 11:1-11:39 (2015).

  49. C. Minoiu, C. Kang, V.S. Subrahmanian, A. Berea. Does Financial Connectedness Predict Crises?, Quantitative Finance , 2014, DOI: 10.1080/14697688.2014.968358.

  50. E. Serra and V.S. Subrahmanian. Should Behavioral Models of Terrorist Groups be Disclosed?, IEEE Intelligent Systems, Vol. 29, Nr. 4, 2014.

  51. C. Molinaro, V. Moscato, A. Picariello, A. Pugliese, A. Rullo and V.S. Subrahmanian. PADUA: A Parallel Architecture to Detect Unexplained Activities, ACM Transactions on Internet Technology, 14(1):3, 2014.

  52. E. Serra and V.S. Subrahmanian. A Survey of Quantitative Models of Terror Group Behavior and an Analysis of Strategic Disclosure of Behavior Models, IEEE Transactions on Computational Social Science in March/April 2014. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6804661&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_Publication_Number%3A6570650%29

  53. V. Martinez, F. Parisi, A. Pugliese, G.I. Simari, and V.S. Subrahmanian. Policy-based Inconsistency Management in Relational Databases, International Journal of Approximate Reasoning, 55.2 (2014): 501-528..

  54. C. Molinaro, A. Sliva, and V.S. Subrahmanian. Super-solutions: Succinctly Representing Solutions in Abductive Annotated Probabilistic Temporal Logic, ACM Transactions on Computational Logic, 15(3): 18 (2014).

  55. C. Kang, A. Pugliese, J. Grant, and V.S. Subrahmanian. STUN: Querying Spatio-temporal Uncertain (social) Networks. Social Network Analysis and Mining journal 4(1) (2014).

  56. A. Pugliese, M. Broecheler, V.S. Subrahmanian and M. Ovelgonne. Efficient Multi-View Maintenance under Insertion in Huge Social Networks, ACM Transactions on the Web Vol. 8, Nr. 2, paper 10, (2014).

  57. F. Spezzano, V.S. Subrahmanian, and A. Mannes. Reshaping Terrorist Networks, Communications of the ACM, Vol. 57 No. 8, pp. 60-69, August 2014.

  58. R. Puzis, M. Purohit, and V.S. Subrahmanian. Betweenness Computation in the Single Graph Representation of Hypergraphs, Social Networks, 35 (2013), pp. 561-572.

  59. A. Pugliese, V.S. Subrahmanian, C. Thomas and C. Molinaro, PASS: A Parallel Activity Search System, IEEE Transactions on Knowledge & Data Engineering, 26(8): 1989-2001 (2014).

  60. M. Albanese, C. Molinaro, F. Persia, A. Picariello and V.S. Subrahmanian. Discovering the Top-K Unexplained Sequences in Time-Stamped Observation Data, IEEE Transactions on Knowledge & Data Engineering, 26(3): 577-594 (2014)

  61. F. Parisi, A. Sliva and V.S. Subrahmanian. A Temporal Database Forecasting Algebra, International Journal of Approximate Reasoning, Vol. 54, Nr. 7, pp. 827-860, 2013.

  62. G. Simari, V. Martinez, A. Sliva and V.S. Subrahmanian. Focused Most Probable World Computations in Probabilistic Logic Programs, Annals of Math and Artificial Intelligence, Vol. 64, Nr. 2-3, pp. 113-143, 2012.

  63. P. Shakarian, M. Broecheler, V.S. Subrahmanian and C. Molinaro. Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems, 14(2):10, ACM Transactions on Computational Logic, 2013.

  64. G. Simari, J. Dickerson, A. Sliva and V.S. Subrahmanian. "Parallel Abductive Query Answering in Probabilistic Logic Programs", ACM Transactions on Computational Logic, 14(2):12, 2013.

  65. V. Martinez, C. Molinaro, J. Grant and V.S. Subrahmanian. Customized Policies to Reason about Partial Information in Databases, IEEE Transactions on Knowledge & Data Engineering 25(6): 1254-1271 (2013).

  66. M. Albanese, A. Pugliese and V.S. Subrahmanian. Fast Activity Detection: Indexing for Temporal Stochastic Automaton Based Activity Detection Models, IEEE Transactions on Knowledge and Data Engineering 25(2): 360-373 (2013).

  67. P. Shakarian, J. Dickerson, and V.S. Subrahmanian. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems Technology, Vol. 3, Nr. 2, Article Nr. 34, 35 pages, Feb. 2012. DOI: 10.1145/2089094.2089110

  68. P. Shakarian, G.I. Simari and V.S. Subrahmanian. "Annotated Probabilistic Temporal Logic: Approximate Fixpoint Implementation", ACM Transactions on Computational Logic, 13.2 (2012): 13

  69. P. Shakarian, V.S. Subrahmanian and M.L. Sapino. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology, Vol. 3, Nr. 1, Oct 2011, Article Nr. 7, doi>10.1145/2036264.2036271

  70. P. Shakarian, A. Parker, G. Simari and V.S. Subrahmanian. Annotated Probabilistic Temporal Logic, ACM Transactions on Computational Logic, Vol. 12, Nr. 2, 2011.

  71. A. Mannes and V.S. Subrahmanian. Calculated terror, Foreign Policy magazine (online edition)¸ Dec. 15, 2009 edition, available online at http://www.foreignpolicy.com/articles/2009/12/15/calculated_terror?page=full

  72. O. Udrea, D. Reforgiato Recupero, and V.S. Subrahmanian. Annotated RDF, ACM Transactions on Computational Logic, Vol. 11, Nr. 2, pp. 1-41, Jan. 2010, http://doi.acm.org/10.1145/1656242.1656245

  73. V.S. Subrahmanian and J. Dickerson. What can virtual worlds do for national security?, Science. Vol. 326, pp. 1201-1202, 27 Nov. 2009.

  74. M. Albanese, R. Chellappa, N. Cuntoor, V. Moscato, A. Picariello, and V.S. Subrahmanian. PADS: A Probabilistic Activity Detection System for Video Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 32, Nr. 12, pp. 2246-2261, Dec. 2010.

  75. V.S. Subrahmanian. Mining Online Opinions, IEEE Computer, pp. 88-90, July 2009. http://www2.computer.org/portal/c/document_library/get_file?uuid=6e9bef9f-5208-480d-b8dc-a1634bfebb15&groupId=889101

  76. J. Grant, F. Parisi, A. Parker and V.S. Subrahmanian. An AGM-Based Belief Revision Mechanism for Probabilistic Spatio-Temporal Logics, Artificial Intelligence. 174 (2010), pp. 72-104, Nov. 2009.

  77. J. Grant, G. Infantes, A. Parker and V.S. Subrahmanian. SPOT Databases: Efficient Consistency Checking and Optimistic Selection in Probabilistic Spatial Databases, IEEE Transactions on Knowledge and Data Engineering, Vol. 21, Nr. 1, pp. 92-107, January 2009.

  78. M. Albanese, R. Chellappa, V. Moscato, A. Picariello, V.S. Subrahmanian, P. Turaga and O. Udrea. A Constrained Probabilistic Petri Net Model for Human Activity Detection in Video, IEEE Transactions on Multimedia, Vol. 10, Nr. 6, pp. 982-996, Oct. 2008. http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4657444&arnumber=4657459&count=29&index=5

  79. R. Chellappa, P. Turaga, V.S. Subrahmanian, and O. Udrea. Machine Recognition of Human Activities: A Survey, IEEE Transactions on Circuit for Systems and Video Technology, Vol. 18, Nr. 11, pp. 1473-1488, Nov. 2008.

  80. D. Reforgiato and V.S. Subrahmanian. AVA: Adjective Verb Adverb Combinations for Sentiment Analysis, IEEE Intelligent Systems, Vol. 23, 4, pp. 43-50, July/Aug 2008.

  81. V.Martinez, G. Simari, A. Sliva and V.S. Subrahmanian. CONVEX: Similarity-based Algorithms for Forecasting Group Behavior, IEEE Intelligent Systems, Vol. 23, 4, pp. 51-57, July/Aug 2008.

  82. S. Khuller, V. Martinez, D. Nau, G. Simari, A. Sliva and V.S. Subrahmanian. Computing Most Probable Worlds of Action Probabilistic Logic Programs: Scalable Estimation for 1030,000 worlds, Annals of Mathematics and Artificial Intelligence, Vol. 51, No, 2-4, pp. 295-331, Dec. 2007.

  83. Y. Zhang, E. Manister, S. Kraus, V.S. Subrahmanian, D. Peleg. Computing the survivability of a multi-agent deployment, Artificial Intelligence, Vol. 173, pp. 437-465, Jan. 2009. Available at http://dx.doi.org/10.1016/j.artint.2008.11.007

  84. V.S. Subrahmanian. Cultural Modeling in Real-time, Science, Vol. 317, Nr. 5844, pp. 1509-1510, Sep. 14, 2007.

  85. A. Parker, J. Grant, and V.S. Subrahmanian. A Logical Formulation of Probabilistic Spatial Databases, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, Nr. 11, pp. 1541-1556, 2007.

  86. M. Fayzullin, V.S. Subrahmanian, M. Albanese, C. Cesarano, A. Picariello. Story Creation from Heterogeneous Data Sources, Multimedia Tools and Applications, Vol. 33, Nr. 3, pp. 351-377, June 2007.

  87. V.S. Subrahmanian, M. Albanese, V. Martinez, D. Nau, D. Reforgiato, G. Simari, A. Sliva and J. Wilkenfeld. CARA: A Cultural Adversarial Reasoning Architecture, IEEE Intelligent Systems, Vol. 22, Number 2, pp. 12—16, March/April 2007. Available at http://www.computer.org/portal/cms_docs_intelligent/intelligent/content/Promo/x2012_07.pdf

  88. E. Hung, L. Getoor and V.S. Subrahmanian. Probabilistic Interval XML, ACM Transactions on Computational Logic, Vol. 8, Nr. 4, August 2007.

  89. M. Fayzullin, V.S. Subrahmanian, M. Albanese, C. Cesarano and A. Picariello. The Priority Curve Algorithm for Video Summarization, Information Science, Vol. 31, pp. 679-695, 2006

  90. J. Dix, S. Kraus and V.S. Subrahmanian. Heterogeneous Temporal Probabilistic Agents, ACM Transactions on Computational Logic, Vol. 7, Nr. 1, Jan. 2006.

  91. M. Fayzullin, V.S. Subrahmanian, A. Picariello, and M.L. Sapino. The CPR Model for Summarizing Video, Multimedia Tools and Applications, Vol. 26, No. 2, pp. 153-173, June 2005.

  92. R. Ross, V.S. Subrahmanian, and J. Grant. Aggregate Operators in Probabilistic Databases, Journal of the ACM, Vol. 52, Nr. 1, pp. 54-101, January 2005.

  93. M. Fayzullin and V.S. Subrahmanian. An Algebra for PowerPoint Sources, Multimedia Tools and Applications Journal, Volume 24, No. 3, December 2004, pp. 273-301.

  94. F. Ozcan, V.S. Subrahmanian, J. Dix. Improving Performance of Heterogeneous Agents, Annals of Mathematics and Artificial Intelligence, 41 (2-4): 339-395, August 2004. Available online to qualified organizations at http://dx.doi.org/10.1023/B:AMAI.0000031199.58726.9a

  95. N. Leone, F. Scarcello and V.S. Subrahmanian. Optimal Models of Disjunctive Logic Programs: Semantics, Complexity, and Computation. IEEE Transactions on Knowledge and Data Engineering, Vol. 16, Nr. 4, pp. 487-503, April 2004.

  96. V. Biazzo, R. Giugno, T. Lukasiewicz and V.S. Subrahmanian Temporal Probabilistic Object Bases, IEEE Transactions on Knowledge and Data Engineering 15(4) pp. 921-939, 2003.

  97. P. Bonatti, S. Kraus, V.S. Subrahmanian. Secure Agents, Annals of Mathematics and Artificial Intelligence 37(1-2), pp. 169-235, 2003.

  98. E. Hwang, B. Prabhakaran and V.S. Subrahmanian. Presentation Planning for Distributed Video on Demand Systems, IEEE Transactions on Knowledge and Data Engineering 14(5), pp. 1059-1077, 2002.

  99. S. Jajodia, P. Samarati, M.L. Sapino and V.S. Subrahmanian. Flexible Support for Multiple Access Control Policies, ACM Transactions on Database Systems (TODS) Vol. 26, Nr. 2, pp. 214 - 260, June 2001. According to an independent study carried out at the University of Leipzig using their iFuice system (http://dbs.uni-leipzig.de/de/projekte/DATAINT/tods.html) this is the most highly cited paper published in this journal in 2001.

  100. A. Dekhtyar, R. Ross, and V.S. Subrahmanian. Probabilistic Temporal Databases, I, ACM Transactions on Database Systems (TODS), Vol. 26, Nr. 1, March 2001.

  101. J. Dix, S. Kraus and V.S. Subrahmanian. Temporal Agent Programs, Artificial Intelligence journal. Vol. 127, 1, pp. 87-135, March 2001.

  102. T. Eiter, J. J. Lu, T. Lukasiewicz, V.S. Subrahmanian. Probabilistic object bases. ACM Transactions on Database Systems, 26(3): 264-312, 2001. According to an independent study carried out at the University of Leipzig using their iFuice system (http://dbs.uni-leipzig.de/de/projekte/DATAINT/tods.html) this is the 5th most highly cited paper published in this journal in 2001.

  103. T. Eiter, V.S. Subrahmanian and T.J. Rogers. Heterogeneous Active Agents, III: Polynomially Implementable Agents, Artificial Intelligence journal, Vol. 117, Nr. 1, pp. 107-167, Feb. 2000.

  104. A. Dekhtyar and V.S. Subrahmanian. Hybrid Probabilistic Programs. Journal of Logic Programming, Vol. 43, Nr. 3, pp. 187-250, June 2000.

  105. L. Golubchik, S. Marcus and V.S. Subrahmanian. Sync Classes: A Framework for Optimal Scheduling of Requests in Multimedia Storage Servers, IEEE Transactions on Knowledge and Data Engineering, Vol. 12, 1, pp. 60-77.

  106. T.J. Rogers, R. Ross and V.S. Subrahmanian. IMPACT: A system for building agent applications, Journal of Intelligent Information Systems, Vol. 14, pp. 95-113.

  107. K.S. Candan, E. Lemar, and V.S. Subrahmanian. Multimedia View Management, Very Large Database (VLDB) Journal, Vol. 9, Nr. 2, pp. 131-153.

  108. J. Dix, V.S. Subrahmanian, and G. Pick. Meta Agent Programs, Journal of Logic Programming, Vol. 46, Nr. 1-2, pp. 1-60, Nov/Dec. 2000.

  109. J. Grant and V.S. Subrahmanian. Applications of Paraconsistency in Data and Knowledge Bases, Synthese, 125, pp. 121-132. Invited overview paper.

  110. M. Fayzullin, M. Nanni, D. Pedreschi, and V.S. Subrahmanian. Foundations of Distributed Interaction Systems, Annals of Math and Artificial Intelligence, Vol. 28, pp. 127-168, 2000.

  111. S. Adali, M.L. Sapino, and V.S. Subrahmanian. Interactive Multimedia Presentation Databases, I: Algebra and Query Equivalences, ACM/Springer Multimedia Systems Journal, Vol. 8, Nr. 3, pp. 212-230, 2000.

  112. J. Dix, M. Nanni and V.S. Subrahmanian. Probabilistic Agent Programs, ACM Transactions on Computational Logic, Vol. 1, Nr. 2, pp. 208-246, Oct. 2000.

  113. V.S. Subrahmanian. Nonmonotonic Logic Programming, IEEE Transactions on Knowledge and Data Engineering, Vol. 11, Nr. 1, Jan/Feb 1999, pp. 143-152.

  114. K. Arisha, T. Eiter, S. Kraus, F. Ozcan, R. Ross and V.S. Subrahmanian. IMPACT: Interactive Maryland Platform for Agents Collaborating Together, IEEE Intelligent Systems, Vol. 14, Nr. 2, pp. 64—72, 1999 (Note: This is a magazine rather than a journal). This is one of the most cited papers on architecture of multiagent systems according to http://citeseer.ist.psu.edu/Agents/Architecture/

  115. T. Eiter, V.S. Subrahmanian and G. Pick. Heterogeneous Active Agents, I: Semantics, Artificial Intelligence , Vol. 108, Nr. 1-2, pp. 179—255, 1999.

  116. T. Eiter and V.S. Subrahmanian. Heterogeneous Active Agents, II: Algorithms and Complexity, Artificial Intelligence journal, Vol. 108, Nr. 1-2, pp. 257—307, 1999.

  117. K.S. Candan, V.S. Subrahmanian and P. Venkat Rangan. Collaborative Multimedia Systems: Synthesis of Media Objects. IEEE Trans. on Knowledge and Data Engineering, Vol. 10, Nr. 3, pp. 433-457, May-June 1998.

  118. K.S. Candan, E. Hwang and V.S. Subrahmanian. An Event-Based Model for Continuous Media Data on Heterogeneous Disk Servers. ACM Multimedia Systems Journal, Vol. 6, Nr. 4, pp. 251—270, 1998.

  119. K.S. Candan, B. Prabhakaran and V.S. Subrahmanian. Retrieval Schedules Based on Resource Availability and Flexible Presentation Specifications. ACM Multimedia Systems Journal, Vol. 6, Nr. 4, pp. 232—250, 1998.

  120. E. Hwang, K. Kilic and V.S. Subrahmanian. Handling Updates and Crashes in VoD Systems, Multimedia Tools and Applications Journal, Vol. 7, Nr. 1/2, pp. 103—132, 1998.

  121. K.S. Candan, B. Prabhakaran and V.S. Subrahmanian. Collaborative Multimedia Documents: Authoring and Presentation, International Journal of Intelligent Systems (special issue on Multimedia Systems), Volume 13, Number 12, December 1998.

  122. V.S. Lakshmanan, N. Leone, R. Ross and V.S. Subrahmanian. ProbView: A Flexible Probabilistic Database System. ACM Transactions on Database Systems, Vol. 22, Nr. 3, pp. 419-469, Sep. 1997. According to an independent study carried out at the University of Leipzig using their iFuice system (http://dbs.uni-leipzig.de/de/projekte/DATAINT/tods.html) this is the 5th most highly cited paper published in this journal in 1994.

  123. A. Nerode, J. Remmel and V.S. Subrahmanian. Annotated Nonmonotone Rule Systems, Theoretical Computer Science, Volume 171, issue 1-2, pp. 77-109. Jan. 1997.

  124. P. Bonatti, M.-L. Sapino and V.S. Subrahmanian. (1997) Merging Heterogeneous Security Orderings, Journal of Computer Security, 5(1):3-29, 1997.

  125. A. Brogi, V.S. Subrahmanian and C. Zaniolo. The Logic of Total and Partial Order Plans: A Deductive Database Approach, Annals of Math and Artificial Intelligence, 1997.

  126. K.S. Candan, J. Grant and V.S. Subrahmanian. A Unified Treatment of Null Values using Constraints. In: Information Science journal, 1997.

  127. J. Benton, S.S. Iyengar, W. Deng, N. Brener, and V.S. Subrahmanian. Tactical Route Planning, New Algorithms for Decomposing the Map, Intl. Journal of Tools in Artificial Intelligence, Vol. 5, Nos. 1 & 2 (1996) 199-218.

  128. E. Hwang and V.S. Subrahmanian. Querying Video Libraries. Journal of Visual Communication and Image Representation, Vol. 7, No. 1, March, pp.44-60, 1996.

  129. S. Marcus and V.S. Subrahmanian. Foundations of Multimedia Database Systems, Journal of the ACM, Vol. 43, 3, pp. 474-523, 1996.

  130. C. Bell, A. Nerode, R. Ng and V.S. Subrahmanian. Implementing Deductive Databases by Mixed Integer Programming, ACM Transactions on Database Systems, vol. 21, nr. 2, pp. 238-269, 1996.

  131. V. Kagan, A. Nerode and V.S. Subrahmanian. Computing Minimal Models by Partial Instantiation. Theoretical Computer Science, vol. 155, pp. 157-177, 1996.

  132. S. Adali and V.S. Subrahmanian. Amalgamating Knowledge Bases, III: Algorithms, Data Structures and Query Processing. Journal of Logic Programming, Vol. 28(1), pp. 57-100, July 1996.

  133. S. Adali, K.S. Candan, S.-S. Chen, K. Erol, and V.S. Subrahmanian. Advanced Video Information Systems, ACM Multimedia Systems Journal, 4, pp. 172-186, 1996.

  134. J. Lu, A. Nerode and V.S. Subrahmanian. Hybrid Knowledge Bases, IEEE Transactions on Knowledge and Data Engineering, 8, 5, pp. 773-785, Oct. 1996.

  135. G. Gottlob, S. Marcus, A. Nerode, G. Salzer and V.S. Subrahmanian. A Non-Ground Realization of the Stable and Well-Founded Semantics. Theoretical Computer Science, vol. 166, Nr. 1/2, pp. 221-262, Oct.1996.

  136. S. Pradhan, J. Minker and V.S. Subrahmanian. Combining Databases with Prioritized Information, Journal of Intelligent Information Systems 1996.

  137. S. Kraus and V.S. Subrahmanian. Multiagent Reasoning with Probability, Time and Beliefs, International Journal of Intelligent Systems, 10(5) 459—499, 1995.

  138. A. Brink, S. Marcus and V.S. Subrahmanian. Heterogeneous Multimedia Reasoning. IEEE Computer, 28, 9, pp. 33-39, Sep. 1995.

  139. X. Y. Wang, S. Jajodia, and V.S. Subrahmanian. Temporal Modules: An Approach Toward Federated Temporal Databases, Information Sciences, Vol. 82, pp. 103-128, 1995.

  140. V.S. Subrahmanian, D.S. Nau and C. Vago. WFS + Branch and Bound = Stable Models, IEEE Transactions on Knowledge and Data Engineering, 7, 3, pp. 362-377, June 1995.

  141. P. Bonatti, S. Kraus and V.S. Subrahmanian. Foundations of Secure Deductive Databases, IEEE Transactions on Knowledge and Data Engineering, 7,3, pp., June 1995.

  142. K. Erol, D.S. Nau and V.S. Subrahmanian. Complexity, Decidability and Undecidability Results for Domain-Independent Planning. Artificial Intelligence Journal, 76, 1-2, pp. 75-88, 1995.

  143. J. Grant and V.S. Subrahmanian. The Optimistic and Cautious Semantics for Inconsistent Knowledge Bases, Acta Cybernetica, Vol. 12, No.1, 1995.

  144. R. Ng and V.S. Subrahmanian. Stable Semantics for Probabilistic Deductive Databases, Information and Computation, 110, 1, pp. 42-83, 1994. This is one of the most highly cited papers in deductive databases according to http://citeseer.ist.psu.edu/Databases/Deductive/

  145. V. Kagan, A. Nerode and V.S. Subrahmanian. Computing Definite Logic Programs by Partial Instantiation, Annals of Pure and Applied Logic, Vol. 67, pp. 161-182, 1994.

  146. V.S. Subrahmanian. Amalgamating Knowledge Bases, ACM Transactions on Database Systems, 19, 2, pp. 291-331, 1994. According to an independent study carried out at the University of Leipzig using their iFuice system (http://dbs.uni-leipzig.de/de/projekte/DATAINT/tods.html) this is the 3rd most highly cited paper published in this journal in 1994.

  147. C. Bell, A. Nerode, R. Ng and V.S. Subrahmanian. Mixed Integer Programming Methods for Computing Non-Monotonic Deductive Databases, Journal of the ACM, Vol. 41, Nr. 6, pp. 1178-1215, Nov. 1994.

  148. J. Grant and V.S. Subrahmanian. Reasoning About Inconsistent Knowledge Bases, IEEE Transactions on Knowledge and Data Engineering, 7,1, pp. 177-189.

  149. A. Nerode, R. Ng and V.S. Subrahmanian. Computing Circumscriptive Databases, Part I: Theory and Algorithms, Information and Computation, Vol. 116, Nr. 1, pp. 58-80.

  150. S. Adali and V.S. Subrahmanian. Amalgamating Knowledge Bases, II: Distributed Mediators. Intl. Journal of Intelligent Cooperative Information Systems, 3, 4, pp. 349-383, 1994.

  151. C. Baral, S. Kraus, J. Minker, and V.S. Subrahmanian. Combining Default Logic Databases, in: Intl. Journal of Intelligent and Cooperative Info. Systems, 3, 3, pp. 319-348, 1994.

  152. J. Lu and V.S. Subrahmanian. Completeness Issues in RUE-NRF Deduction, Journal of Automated Reasoning, 10, pp. 371-388, 1993.

  153. R. Ng and V.S. Subrahmanian. Probabilistic Logic Programming, Information and Computation, 101, 2, pp. 150-201, 1993.

  154. J. Fernandez, J. Lobo, J. Minker and V.S. Subrahmanian. Disjunctive LP + Integrity Constraints = Stable Model Semantics, Annals of Mathematics and Artificial Intelligence, Vol. 8, pp. 449-474, 1993.

  155. R. Ng and V.S. Subrahmanian. A Semantical Framework for Supporting Subjective and Conditional Probabilities in Deductive Databases, Journal of Automated Reasoning, 10, 2, pp. 191-235, 1993.

  156. C. Baral and V.S. Subrahmanian. Dualities Between Alternative Semantics for Logic Programming and Non-Monotonic Reasoning, Journal of Automated Reasoning, 10, pp. 399-420, 1993.

  157. J. Lobo and V.S. Subrahmanian. Relating Minimal Models and Pre-Requisite-Free Normal Defaults, Information Processing Letters, 44, pp. 129-133, 1992.

  158. C. Baral and V.S. Subrahmanian. Stable and Extension Class Theory for Logic Programs and Default Theories, Journal of Automated Reasoning, 8, pp. 345-366, 1992.

  159. C. Baral, S. Kraus, J. Minker and V.S. Subrahmanian. Combining Knowledge Bases Consisting of First Order Theories, Computational Intelligence, 8, 1, pp. 45-71, 1992.

  160. W. Marek and V.S. Subrahmanian. The Relationship Between Stable, Supported, Default and Auto-Epistemic Semantics for General Logic Programs, in: Theoretical Computer Science, 103, pp. 365-386, 1992.

  161. M. Kifer and V.S. Subrahmanian. Theory of Generalized Annotated Logic Programming and its Applications, Journal of Logic Programming, 12, 4, pp. 335-368, 1992.

  162. V.S. Subrahmanian. Paraconsistent Disjunctive Deductive Databases, Theoretical Computer Science, Vol. 93, pp. 115-141. February 1992.

  163. T. Murata, V.S. Subrahmanian and T. Wakayama. A Petri Net Model for Reasoning in the Presence of Inconsistency, in: IEEE Transactions on Knowledge and Data Engineering, Vol. 3, 3, pp. 281-292, 1991.

  164. N.C.A. da Costa, V.S. Subrahmanian and C. Vago. The Paraconsistent Logics PT, Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik, Vol. 37, pp. 139-148, 1991.

  165. J. Abe, N.C.A. da Costa and V.S. Subrahmanian. Remarks on Annotated Logics, Zeitschrift fur Mathematische Logik und Grundlagen der Mathematik, Vol. 37, 1991, pp. 561-570.

  166. J. Lu and V.S. Subrahmanian. Protected Completions of First Order General Logic Programs, Journal of Automated Reasoning, 6, pp. 147-172, 1990.

  167. V.S. Subrahmanian. A Ring-Theoretic Basis for Logic Programming, International Journal of Foundations of Computer Science, 1, 1, pp. 23-48, 1990.

  168. A. Hirani and V.S. Subrahmanian. Algebraic Foundations of Logic Programming, I: The Distributive Lattice of Logic Programs, Fundamenta Informaticae, Vol. XIII, No. 3, pp. 317-332, 1990.

  169. V.S. Subrahmanian. Mechanical Proof Procedures for Many-Valued Lattice-Based Logic Programming, Journal of Non-Classical Logic, Vol. 7, No. 1/2, pp. 7-41, 1990.

  170. N.C.A. da Costa and V.S. Subrahmanian. Paraconsistent Logics as a Formalism for Reasoning About Inconsistent Knowledge Bases, Journal of Artificial Intelligence in Medicine, Vol. 1, 4, pp 167-174, 1990.

  171. V.S. Subrahmanian. Y-Logic: A Framework for Reasoning about Chameleonic Programs with Inconsistent Completions, Fundamenta Informaticae, Vol. XIII, 4, pp. 465-483, 1990.

  172. J. Chomicki and V.S. Subrahmanian. Generalized Closed World Assumption is -Complete, Information Processing Letters, 34, pp. 289-291, 1990.

  173. H. Blair and V.S. Subrahmanian. Paraconsistent Logic Programming, Theoretical Computer Science, Vol. 68, pp 135-154, 1989.

  174. A. Batarekh and V.S. Subrahmanian. Topological Model Set Deformations in Logic Programming, Fundamenta Informaticae, Vol. XII, No. 3, pp. 357-400, Sep. 1989, North Holland.

  175. H. Blair and V.S. Subrahmanian, Paraconsistent Foundations for Logic Programming, J. of Non-Classical Logic, 5, 2, pp. 45-73.

Refereed Conference Proceedings

  1. T. Deb, J, Dix, M. Jeong, C. Molinaro, A. Pugliese, A. Quattrini Li, E. Santos, V.S. Subrahmanian, S. Yang and Y. Zhang. DUCK: A Drone-Urban Cyber-Defense Framework based on Pareto-Optimal Deontic Logic Agents, accepted for publication at the 2023 Association for the Advancement AI Conference (AAAI 2023), demo paper.

  2. C. Bai, M. Bolonkin, V. Regunath, and V.S. Subrahmanian. POLLY: A Multimodal Cross-Cultural Context-Sensitive Framework to Predict Political Lying from Videos, Proc. 24th ACM International Conference on Multimodal Interaction, Bengaluru, Nov. 2022.

  3. Y. Zhang, S. Chakrabarty, R. Liu, A. Pugliese, and V.S. Subrahmanian. A New Dynamically Changing Attack on Review Fraud Systems and a Dynamically Changing Ensemble Defense, Proc. 20th IEEE International Conference on Dependable, Autonomic & Secure Computing”. Sep 2022, Calabria, Italy. Recipient of the Best Paper Award.

  4. 4. Y. Zhang, B. An and V.S. Subrahmanian. Correlation-Based Algorithm for Team-Maxmin Equilibrium in Multiplayer Extensive-Form Games, Proc. IJCAI 2022, pages 606-612, July 2022, Vienna, Austria.

  5. S. Kang, C. Molinaro, A. Pugliese, and V.S. Subrahmanian. Randomized Generation of Adversary-Aware Fake Knowledge Graphs to Combat Intellectual Property Theft, accepted for publication in Proc. AAAI 2021, Feb 2-9, 2021. Acceptance rate: 18.73%

  6. H C. Bai, S. Kumar, J. Leskovec, and V.S. Subrahmanian. Deception Prediction in Dynamic Face-To-Face Interaction Networks, accepted for publication in Proc. 2021 AAAI International Conference on the Web & Social Media, Nov. 2019. (rolling acceptances, acceptance rate in Sep 2020 was 3/90 papers).

  7. H. Chen, J. Liu, R. Liu, N. Park, and V.S. Subrahmanian, VASE: A Twitter-based Vulnerability Analysis and Score Engine, Proc. 2019 IEEE Intl. Conf. on Data Mining (ICDM 2019), Nov. 2019. Acceptance rate: 18.5%.

  8. Lezi Wang, Chongyang Bai, Maksim Bolonkin, Judee Burgoon, Norah Dunbar, V. S. Subrahmanian, Dimitris N. Metaxas. Attention-based Facial Behavior Analytics, Proc. 2019 British Machine Vision Conference, Sep 2019, Cardiff, UK. Acceptance rate: 25%.

  9. H. Chen, J. Liu, R. Liu, N. Park and V.S. Subrahmanian. VEST: A System for Vulnerability Exploit Scoring & Timing, Demo paper, Proc. 2019 Intl. Joint Conference on Artificial Intelligence (IJCAI 2019), Aug 2019, Macao. Acceptance rate: 17.89%. This paper was named the runner up for the Most Innovative Demo at IJCAI 2019.

  10. H. Chen, S. Jajodia, J. Liu, N. Park, V. Sokolov, V.S. Subrahmanian. FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data, Proc. 2019 Intl. Joint Conference on Artificial Intelligence (IJCAI 2019), Aug 2019, Macao. Acceptance rate: 17.89%.

  11. C. Bai, M Bolonkin, S. Kumar, J. Leskovec, M. Metzger, J. Nunamaker, V.S. Subrahmanian. Extracting Interaction Networks from Multi-Person Discussion Videos, Proc. 2019 Intl. Joint Conference on Artificial Intelligence (IJCAI 2019), Aug 2019, Macao. Acceptance rate: 17.89%.

  12. C. Bai, M. Bolonkin, J. Burgoon, N. Dunbar, V.S. Subrahmanian. Predicting dominance in multi-person videos, Proc. 2019 Intl. Joint Conference on Artificial Intelligence (IJCAI 2019), Aug 2019, Macao. Acceptance rate: 17.89%.

  13. H. Chen, R. Lui, N. Park, and V.S. Subrahmanian. Using Twitter to Predict When Vulnerabilities will be Exploited, Proc. 2019 ACM Conference on Knowledge Discovery & Data Mining (KDD ’19), Anchorage, Alaska, Aug 2019. Acceptance rate: 20.7%.

  14. C. Bai, V.S. Subrahmanian, T. White, L. Xiao, P. Zhou. 'C2P2: A Collective Cryptocurrency Up/Down Price Prediction Engine', Proc. 2019 IEEE International Conference on Blockchain, Atlanta, Georgia, July 2019.

  15. C. Bai, M. Bolonkin, J. Burgoon, C. Chen, N. Dunbar, B. Singh, V.S. Subrahmanian, Z. Wu. Automatic Long-Term Deception Detection in Group Interaction Videos, Proc. 2019 IEEE Intl. Conf. on Multimedia & Expo (ICME 2019), Shanghai, July 2019. Acceptance rate: 30%.

  16. Z. Wu, B. Singh, L. Davis and V.S. Subrahmanian. Deception Detection in Videos, accepted for publication in AAAI 2018, Feb 2018, acceptance rate: 24.55%.

  17. S. Kumar, B. Hooi, M. Kumar, D. Makhija, C. Faloutsos, and V.S. Subrahmanian. Rev2: Fraudulent User Prediction in Rating Platforms, accepted for publication in 11th ACM Conf. on Web Search & Data Mining (WSDM), Los Angeles, Feb 2018. Acceptance rate: 16.15%.

  18. T. Chakraborty, D. Chandhok, and V.S. Subrahmanian. MC3: A Multi-Class Consensus Classification Framework,: Proc. 2017 Pacific-Asia Knowledge Discovery & Data Mining Conference (PAKDD-2017), Jeju, South Korea, Springer, May 2017. Regular presentation paper. Acceptance rate: 28.2%

  19. S. Kumar, J. Cheng, J. Leskovec, and V.S. Subrahmanian. An Army of Me: Sockpuppets in Online Discussion Communities, Proc. 26th International Conference on the World Wide Web (WWW 2017), Perth, Australia, April 2017. Received Best Paper Honorable Mention Acceptance rate: 17%.

  20. S. Kumar, F. Spezzano, V.S. Subrahmanian and C. Faloutsos. Edge Weight Prediction in Weighted Signed Networks, accepted for publication in Proc. 2016 IEEE International Conference on Data Mining (ICDM 2016), Barcelona, Spain, Dec 2016. Acceptance rate for regular papers: 8.5%.

  21. B. An, H. Chen, N. Park, and V.S. Subrahmanian. MAP: Frequency-Based Maximization of Airline Profits based on an Ensemble Forecasting Approach, Proc. 2016 ACM Conf. on Knowledge Discovery & Data Mining (KDD), August 2016, San Francisco, CA. Poster/ Acceptance rate (combined for papers + posters): 19.94%.

  22. T. Chakraborty, N. Park, and V.S. Subrahmanian. Ensemble-Based Algorithms to Detect Disjoint and Overlapping Communities in Networks, Proc. 2016 IEEE/ACM Conf. on Advances in Social Network Analysis and Mining, San Francisco, Aug 2016. Acceptance rate: 13.61%. Runner up for best paper award.

  23. S. Kumar, E. Serra, F. Spezzano, and V.S. Subrahmanian. Metric Logic Program Explanations for Complex Separator Functions, Proc. 2016 Intl. Conf. on Scalable Uncertainty Management, Nice, Sep 2016.

  24. E. Serra, F. Spezzano, and V.S. Subrahmanian. ChoiceGAPs: Competitive Diffusion as a Massive Multi-Player Game in Social Networks, Proc. 2016 Intl. Conf. on Scalable Uncertainty Management, Nice, Sep 2016.

  25. C. Kang, N. Park, B.A. Prakash, E. Serra, and V.S. Subrahmanian. Ensemble Models for Data-Driven Prediction of Malware Infections, Proc. 9th ACM International Conf. on Web Science and Data Mining (WSDM 2016), San Francisco, Feb 2016. Acceptance rate: 18.2%.

  26. S. Kumar, F. Spezzano, and V.S. Subrahmanian. VEWS: A Wikipedia Vandal Early Warning System, Proc. 2015 ACM Conf. on Knowledge Discovery & Data Mining (KDD), August 2015, Sydney Australia, Acceptance rate: 19.4%

  27. I. Andrews, S. Kumar, F. Spezzano and V.S. Subrahmanian. SPINN: Suspicion Prediction in Nuclear Networks, Proc. 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, MD, May 2015.

  28. S. Banaszak, E. Bowman, J. Dickerson, and V.S. Subrahmanian. Forecasting Country Stability in North Africa, Proc. 2014 IEEE Joint Conference on Intelligence and Security Informatics (JISIC), The Hague, Sep 24-26 2014.

  29. S. Kumar, F. Spezzano, V.S. Subrahmanian. Accurately Detecting Trolls in Slashdot Zoo via Decluttering, Proc. ACM/IEEE Intl. Conf. on Advances in Social Network Analysis and Mining (ASONAM) 2014, Beijing, August 2014. Acceptance rate: 18%.

  30. J. Dickerson, V. Kagan, and V.S. Subrahmanian. Using Sentiment to Detect Bots on Twitter: Are Humans more Opinionated than Bots?, Proc. ACM/IEEE Intl. Conf. on Advances in Social Network Analysis and Mining (ASONAM) 2014, Beijing, August 2014 (industrial papers session).

  31. D. Skillicorn, F. Spezzano, V.S. Subrahmanian and M. Garber. Understanding South Asian Violent Extremist Group-Group Interactions, Proc. ACM/IEEE International Symposium on Foundations of Open Source Intelligence and Security Informatics - FOSINT-SI 2014, Beijing, August 2014.

  32. C. Kang, A. Prakash, M. Purohit, V.S. Subrahmanian. Fast Influence-Based Coarsening for Large Networks, Proc. ACM Conf. on Knowledge Discovery & Data Mining (KDD) 2014, New York, August 2014. Acceptance rate: 14.6%.

  33. S. Banaszak, V. Kagan, A. Stevens, and V.S. Subrahmanian. "COPTADS: Clinical Online PTSD and TBI Analysis and Detection System", Proceedings of 2013 International Workshop on Visual Analytics in Healthcare, Washington DC, Nov 2013.

  34. M. Ovelgonne, N. Park and V.S. Subrahmanian. Pattern-based Centrality in Semantics Graphs, Proc. SOCIALCOM 2013, Washington DC. Sep 2013. Acceptance rate: 9.9%.

  35. M. Ovelgonne, N. Park, V.S. Subrahmanian, L. Bowman and K., Ogaard. Personalized Best Answer Computation in Graph Databases, Proc. 2013 Intl. Semantic Web Conference, Oct 2013, Sydney, Australia, acceptance rate: 21.5%.

  36. J. Dickerson, A. Sawant, M.T. Hajiaghayi and V.S. Subrahmanian. PREVE: A Policy Recommendation Engine based on Vector Equilibria Applied to Reducing LeT's Attacks, Proc. 2013 International Conference on Foundations of Open Source Intelligence – Security Informatics (FOSINT-SI 2013) , Niagara Falls, Canada, August 2013.

  37. F. Spezzano, V.S. Subrahmanian and A. Mannes. STONE: Shaping Terrorist Organizational Network Efficiency, Proc. 2013 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2013), August 2013, Niagara Falls, Canada. Acceptance rate: 13%

  38. C. Minoiu, C. Kang. A. Berea and V.S. Subrahmanian. The Role of Financial Connectedness in Predicting Crises, 2013 Conference on Interlinkages and Systemic Risk, July 2013, Ancona, Italy.

  39. P. Shakarian and V.S. Subrahmanian. Geospatial Optimization Problems, Proc. IEEE Network Science Workshop, April-May 2013, West Point, NY.

  40. C. Kang, J. Grant, A. Pugliese, and V.S. Subrahmanian. STUN: Spatio-Temporal Uncertain (Social) Networks, Proc. 2012 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2012), August 2012, Istanbul, Turkey (full paper – 16% acceptance rate).

  41. C. Kang, C. Molinaro, S. Kraus, Y. Shavitt, and V.S. Subrahmanian. Diffusion Centrality in Social Networks,Proc. 2012 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2012), August 2012, Istanbul, Turkey (short paper – 25% acceptance rate).

  42. M. Ovelgionne, C. Kang, A. Sawant and V.S. Subrahmanian. Covertness Centrality in Networks, Proc. 2012 Intl. Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI), Istanbul, Turkey, August 2012.

  43. M. Broecheler, A. Pugliese, and V.S. Subrahmanian. Efficient Multi-View Maintenance in the Social Semantic Web, Proc. Intl. Conf. on the World Wide Web WWW (Companion Volume) 2012: 467-468, poster presentation.

  44. M. Albanese, S. Jajodia, A. Pugliese, V.S. Subrahmanian: Scalable Detection of Cyber Attacks. Proc. 10th International Conference on Computer Information Systems - Analysis and Technologies, CISIM 2011, Kolkata, India, December 14-16, 2011. Proceedings. Communications in Computer and Information Science Vol. 245 Springer 2011, (eds. N. Chaki and A. Cortesi), pp. 9-18.

  45. M. Albanese, S. Jajodia, A. Pugliese, V.S. Subrahmanian: Scalable Analysis of Attack Scenarios. Proc. European Symposium on Research in Computer Security (ESORICS) 2011: 416-433, Sep. 2011, Belgium. Springer.

  46. A. Mannes, A. Sliva, and V.S. Subrahmanian. A Computational Enabled Analysis of Lashkar-e-Taiba Attacks in Jammu & Kashmir, Proc. 2011 IEEE European Intelligence & Security Informatics Conference, Athens, Sep. 2011, pp. 224-229.

  47. J. Dickerson, A. Mannes, and V.S. Subrahmanian Dealing with Lashkar-e-Taiba: A Multi-Player Game-Theoretic Perspective, Proc. IEEE International Symposium on Open-Source Intelligence and Web Mining, Athens, Greece, Sep. 2011, pp. 354-359.

  48. M. Broecheler, A. Pugliese and V.S. Subrahmanian. Probabilistic Subgraph Matching on Huge Social Networks, Proc. 2011 Intl. Conference on Advances in Social Network Analysis and Mining, July 2011, Kohsiung, Taiwan, pp. 271-278.

  49. M. Albanese, C. Molinaro, F. Persia, A. Picariello, V.S. Subrahmanian. Finding Unexplained Activities in Video, accepted as both a talk and a poster at the 2011 International Joint Conf. on Artificial Intelligence,Barcelona, July 2011. (acceptance rate as both talk and poster: 17%), pp. 1628-1634.

  50. G. Simari, A. Sliva, A. Parker, V.S. Subrahmanian. Approximate Achievability in Event Databases, Proc. 11th European Conf. on Symbolic & Quantitative Approaches to Reasoning with Uncertainty, June 2011, Ireland, pp. 737-748.

  51. P. Shakarian, M. Nagel, B. Schuetzle, and V.S. Subrahmanian. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, Proc. 2011 Intl. Conf. on Innovative Applications of Artificial Intelligence, Aug. 2011, AAAI Press.

  52. M. Broecheler, A. Pugliese and V.S. Subrahmanian. "A Budget –based Algorithm for Efficient Subgraph Matching on Huge Networks", Proc. 2011 International Conference on Graph Data Management, Hanover, Germany, April 2011, pp. 94-99.

  53. G.I. Simari, J. Dickerson and V.S. Subrahmanian. Cost-based Query Answering in Action Probabilistic Logic Programs, Proc. 2010 Intl. Conf. on Scalable Uncertainty Management (eds. A. Deshpande and A. Hunter), Springer Lecture Notes in Computer Science, Sep. 2010, Toulouse, France, pp. 319-332.

  54. M.V. Martinez, F. Parisi, A. Pugliese, G.I. Simari, J. Dickerson and V.S. Subrahmanian. Efficient Policy-based Inconsistency Management, Proc. 2010 Intl. Conf. on Scalable Uncertainty Management (eds. A. Deshpande and A. Hunter), Springer Lecture Notes in Computer Science, Sep. 2010, Toulouse, France, pp. 264-277.

  55. M. Broecheler, A. Pugliese and V.S. Subrahmanian. COSI: Cloud Oriented Subgraph Identification in Massive Social Networks, Proc. 2010 Intl. Conf. on Advances in Social Networks and Mining (ASONAM-2010), Aug. 2010, Odense, Denmark, pp. 248-255.

  56. P. Shakarian, V.S. Subrahmanian and M.L. Sapino. Using Generalized Annotated Logic Programs to Solve Social Network Optimization Problems, Tech. Communications of the 2010 Intl. Conf. on LogicProgramming, Edinburgh, UK, July 2010, pp. 182-191.

  57. G. Simari and V.S. Subrahmanian. Abductive Inference in Probabilistic Logic Programs, Tech. Communications of the 2010 Intl. Conf. on Logic Programming, Edinburgh, UK, July 2010, pp. 192-201.

  58. J. Dickerson, G. Simari, S. Kraus and V.S. Subrahmanian. A Graph-Theoretic Approach to Protecting Static and Moving Targets from Adversaries, Proc. 2010 Intl. Conf. on Autonomous Agents and Multi-Agent Systems, Toronto, May 2010, pp. 299-306.

  59. P. Shakarian, M.L. Sapino and V.S. Subrahmanian. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.

  60. M. Broecheler, A. Pugliese and V.S. Subrahmanian. DOGMA: A Disk-Oriented Graph Matching Algorithm, Proc. 2009 International Semantic Web Conference, Washington DC, Oct. 2009.

  61. A. Parker, V.S. Subrahmanian and J. Grant. Fast and Accurate Prediction of the Destination of Moving Objects, Proc. 2009 Intl. Conf. on Scalable Uncertainty Management, Washington DC, Sep. 2009, Springer Lectures Notes in Computer Science Vol. 5785 (eds. L. Godo and A. Pugliese), pp. 180-192.

  62. M. Broecheler, G. Simari and V.S. Subrahmanian. Using Histograms to Better Answer Queries to Probabilistic Logic Programs, Proc. 2009 International Conference on Logic Programming, Pasadena, CA, July 2009. Recipient of the best student paper award at ICLP 2009 (credit should go to my two student co-authors!).

  63. A. Gal, V. Martinez, G.I. Simari and V.S. Subrahmanian. Aggregate Query Answering Under Uncertain Schema Mappings, Proc. 2009 IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, March-April 2009, to appear.

  64. G. I. Simari, V. Martinez, A. Sliva and V.S. Subrahmanian. Scaling Most Probable World Computations in Probabilistic Logic Programs, Proc. 2008 Intl. Conf. on Scalable Uncertainty Management, Oct. 2008, Naples, Italy. Springer Verlag Lectures Notes in Computer Science.

  65. Aaron Mannes, Amy Sliva, V.S. Subrahmanian and Jonathan Wilkenfeld. Stochastic Opponent Modeling Agents: A Case Study with Hamas, Proc. 2008 Intl. Conf. on Computational Cultural Dynamics, pp. 49-54, Sep. 2008, AAAI Press.

  66. J. Dickerson, M. Vanina Martinez, D. Reforgiato and V.S. Subrahmanian, University of Maryland. CIG: Cultural Island and Games, Proc. 2008 Intl. Conf. on Computational Cultural Dynamics, pp. 26-31, Sep. 2008, AAAI Press.

  67. V. Martinez, F. Parisi, A. Pugliese, G. Simari and V.S. Subrahmanian. Inconsistency Management Policies, Proc. KR 2008, Sydney, Australia, Sep. 2008.

  68. G. Simari, M. Broecheler, V.S. Subrahmanian and Sarit Kraus. Promises Kept, Promises Broken: An Axiomatic and Quantitative Treatment of Fulfilment, Proc. KR 2008, Sydney, Australia, Sep. 2008.

  69. A. Parker, G. Infantes, J. Grant and V.S. Subrahmanian. An AGM-based Belief Revision Mechanism for Probabilistic Spatio-Temporal Logics, Proc. AAAI 2008, pp. 606-614, Boston, MA. One of a relatively small number of papers at AAAI 2008 accepted for both oral and poster presentation.

  70. A. Pugliese, O. Udrea and V.S. Subrahmanian. Scalable Indexing for Temporal RDF, Proc. 2008 International World Wide Web Conference (WWW ’08), Beijing, China, pp. 605-614, April 2008. http://doi.acm.org/10.1145/1367497.1367579

  71. V. Martinez, G. Simari, A. Sliva and V.S. Subrahmanian. The SOMA Terror Organization Portal (STOP): Social Network and Analytic Tools for the Real-Time Analysis of Terror Groups, in Proc. 2008 First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction (eds. H. Liu, J. Salerno and M. Young), pp. 9-18, Phoenix, April 1-2, 2008, Springer Verlag.

  72. A. Mannes, M. Michaell, A. Pate, A. Sliva, V.S. Subrahmanian and J. Wilkenfeld. Stochastic Opponent Modelling Agents: A Case Study with Hezbollah, Proc. 2008 First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction, (eds. H. Liu, J. Salerno, and M. Rogers), Springer Verlag, Phoenix, April 1-2, 2008.

  73. V. Martinez, A. Pugliese, G. I. Simari, V.S. Subrahmanian and H. Prade. How Dirty is your Relational Database?, Proc. ECSQARU 2007, pp. 103-114.

  74. S. Khuller, V. Martinez, D. Nau, A. Sliva, G.I. Simari and V.S. Subrahmanian. Finding Most Probable Worlds of Probabilistic Logic Programs, Proc. 2007 International Conference on Scalable Uncertainty Management, Lecture Notes in Computer Science Vol. 4772, pp. 45-59, Springer Verlag.

  75. O. Udrea, Z. Majkic and V.S. Subrahmanian. Aggregates in generalized temporally indeterminate databases, Proc. 2007 International Conference on Scalable Uncertainty Management, Lecture Notes in Computer Science Vol. 4772, pp. 171-186, Springer Verlag.

  76. M. Albanese, A. Pugliese, V.S. Subrahmanian, and O. Udrea. MAGIC: A Multi-Activity Graph Index for Activity Detection, Proc. 2007 IEEE International Conference on Information Reuse and Integration, Las Vegas, August 2007. pp. 267-272.

  77. A. Sliva, V. Martinez, G. Simari and V.S. Subrahmanian. SOMA Models of the Behaviors of Stakeholders in the Afghan Drug Economy: A Preliminary Report. Proc. 2007 International Conference on Computational Cultural Dynamics, College Park, MD, pp. 78-86, AAAI Press, Aug. 2007.

  78. M. Albanese and V.S. Subrahmanian. T-REX: A System for Automated Cultural Information Extraction, Proc. 2007 International Conference on Computational Cultural Dynamics, College Park, MD, pp. 2-8, AAAI Press, Aug. 2007.

  79. O. Udrea, A. Pugliese and V.S. Subrahmanian. GRIN: A Graph-based RDF Index, Proc. AAAI 2007, pp. 1465-1470, July 2007.

  80. F. Benamara, C. Cesarano, A. Picariello, D. Reforgiato, V.S. Subrahmanian. Sentiment Analysis: Adverbs and Adjectives are Better than Adjectives Alone, Proc. 2007 Intl. Conf. on the Web and Social Media, pp. 203—206, Boulder, CO, March 2007.

  81. C. Cesarano, A. Picariello, D. Reforgiato, V.S. Subrahmanian. OASYS 2: An Opinion Analysis System, Proc. 2007 Intl. Conf. on the Web and Social Media, pp. 313-314, Boulder, CO, March 2007. This is just a short demo description.

  82. M. Albanese, V. Moscato, A. Picariello, V.S. Subrahmanian, O. Udrea. Detecting Stochastically Defined Activities in Video, Proc. IJCAI 2007, pp. 1802—1807, Jan. 2007, Hyderabad, India.

  83. F. Yaman, A. Parker and V.S. Subrahmanian. Probabilistic Go-Theories, Proc. IJCAI 2007, pp. 501-506, Jan. 2007, Hyderabad, India.

  84. V.S. Subrahmanian and L. Amgoud. A General Framework for Reasoning about Inconsistency, Proc. IJCAI 2007, pp. 599-604, Jan. 2007, Hyderabad, India.

  85. O. Udrea, V.S. Subrahmanian, and Z. Majkic. Probabilistic RDF. Proc. IRI 2006: 172-177

  86. A. Parker, D. Nau and V.S. Subrahmanian. Overconfidence or Paranoia: Search in Partial Information Games. Proc. AAAI-2006, Boston, July 2006.

  87. O. Udrea, D. Reforgiato and V.S. Subrahmanian. Annotated RDF, Proc. 2006 European Semantic Web Conference, Budva, Montenegro, Lecture Notes in Computer Science, Volume 4011, June 2006, Pp. 487 - 501, DOI 10.1007/11762256_36, URL http://dx.doi.org/10.1007/11762256_36

  88. C. Cesarano, B. Dorr. A. Picariello, D. Reforgiato, A. Sagoff, and V.S. Subrahmanian. Opinion analysis in Document Databases, Proc. 2006 AAAI Spring Symposium on Computational Approaches to Analyzing Weblogs, Stanford, CA, March 2006.

  89. G. Simari, A. Sliva, D. Nau and V.S. Subrahmanian. A Stochastic Language for Modelling Opponent Agents. Proc. Intl. Conf. on Autonomous Agents and Multiagent Systems, pp. 244-246, Hakodate, Japan, May 2006. Poster paper.

  90. J. Dix, W. Faber and V.S. Subrahmanian. The Relationship between Reasoning about Privacy and Default Logics, Proc. 2005 Intl. Conf. on Logic Programming and Artificial Intelligence Reasoning, Dec. 2005, Jamaica.

  91. O. Udrea, Y. Deng and V.S. Subrahmanian. Probabilistic Ontologies and Databases, Proc. 2005 Intl. Conf. on Ontologies, Databases, and Semantics, Oct/Nov 2005, Agia Napa, Cyprus Proc. Springer Lecture Notes in Computer Science, Vol. 3760.

  92. Y. Zhang, E. Manister, S. Kraus and V.S. Subrahmanian. Approximation results for probabilistic survivability, Proc. of the 2nd IEEE Symposium on Multi-Agent Security and Survivability, Philadelphia, Aug. 2005. This was the highest rated paper at the conference.

  93. F. Yaman, D. Nau and V.S. Subrahmanian. Motion Closed World Assumption, Proc. 2005 International Joint Conference on Artificial Intelligence, Edinburgh, Aug 2005, pp. 621-626.

  94. F. Yaman, D. Nau and V.S. Subrahmanian. Going Far Logically, Proc. 2005 International Joint Conference on Artificial Intelligence Edinburgh, Aug 2005, pp. 615-620.

  95. A. Parker, D. Nau and V.S. Subrahmanian Game-Tree Search with Combinatorially Large Belief States, Proc. 2005 International Joint Conference on Artificial Intelligence Edinburgh, Aug 2005, pp. 254-259.

  96. V.S. Subrahmanian, B. Stroe and S. Dasgupta. Optimal Status Sets of Heterogeneous Agents, Proc. 2005 Intl. Conf. on Autonomous Agents and Multiagent Systems, pp. 709-715, Utrecht, Netherlands, July 2005. Shortlisted for the best paper award (4 papers out of approx. 530 submissions were shortlisted).

  97. O. Udrea, Y. Deng, E. Ruckhaus and V.S. Subrahmanian. A Graph-Theoretical Foundation for Integrating RDF Ontologies, Proc. 2005 National Conference on Artificial Intelligence (AAAI-05), Pittsburgh, PA, July 2005.

  98. E. Hung, Y. Deng and V.S. Subrahmanian. RDF Aggregate Queries and Views, Proc. 2005 IEEE Intl. Conf. on Data Engineering, Japan, March 2005.

  99. I.T. Knight, R. Colwell, J. Ravel and V.S. Subrahmanian. Biological sensor management for homeland defense applications, Proc. 10th Intl. Workshop on Multimedia Information Systems (MIS 2004), pp. 14-19, Aug. 2004.

  100. M. Fayzullin, V.S. Subrahmanian, M. Albanese, C. Cesarano and A. Picariello. STORY: Architecture of a system to create stories about Pompeii and other applications, Proc. 10th Intl. Workshop on Multimedia Information Systems (MIS 2004), pp. 2-13, Aug. 2004.

  101. M. Fayzullin and V.S. Subrahmanian. Optimizing Selection and Mixing in Audio Databases, Proc. 10th Intl. Workshop on Multimedia Information Systems (MIS 2004), pp. 76-85, Aug. 2004.

  102. T.-C. Au, D. Nau and V.S. Subrahmanian, Utilizing Volatile External Information During Planning, Proc. 2004 European Conference on Artificial Intelligence (ECAI), Spain, pp. 647-651, Aug. 2004.

  103. E. Hung, Y. Deng and V.S. Subrahmanian. TOSS: An Extension of TAX with Ontologies and Similarity Queries, Proc. of the 23rd ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), Paris, France, pp. 719-730, June 13-18, 2004.

  104. F. Yaman, D. Nau and V.S. Subrahmanian. The Logic of Motion, Proc. 9th International Conference on the Principles of Knowledge Representation and Reasoning (KR-2004), Whistler, Canada, pp. 85-94, June 2-5, 2004.

  105. F. Yaman, S. Adali, D. Nau, M.L. Sapino and V.S. Subrahmanian. Plan databases: model and algebra, Proc. of the 3rd Intl. Symposium on Foundations of Information and Knowledge Systems (FoIK2004), Vienna, Austria, pp. 302-319, Feb. 2004, Springer Lecture Notes in Computer Science.

  106. V.S. Subrahmanian, S. Kraus, and Y. Zhang. Distributed Algorithms for Dynamic Survivability of Multiagent Systems, Computational Logic in Multi-Agent Systems: 4th International Workshop, CLIMA IV, Lecture Notes in Computer Science, Vol. 3259, pp 1-15, January 2004, Springer Verlag.

  107. M. Fayzullin, V.S. Subrahmanian, A. Picariello and M.L. Sapino. The CPR Model for Video Summarization, Proc. ACM Workshop on Multimedia Database Systems, Nov. 2003, New Orleans, LA.

  108. P. Bonatti, Y. Deng and V.S. Subrahmanian. An Ontology-Extended Relational Algebra, Proc. 2003 IEEE Intl. Conference on Information Reuse and Integration, Las Vegas, Nevada, pp. 192-199, Oct. 2003.

  109. S. Kraus, C. Tas and V.S. Subrahmanian. Probabilistically Survivable Multiagent Systems, Proc. 2003 Intl. Joint Conf. on Artificial Intelligence, pp. 789-795.

  110. B. Stroe and V.S. Subrahmanian. First order heterogeneous agent computations. Proc. 2003 Intl. Conf. on Autonomous Agents and Multiagent Systems, pp. 217-224.

  111. E. Hung, L. Getoor, V.S. Subrahmanian. PXML: A Probabilistic Semistructured Data Model and Algebra, Proc. 2003 IEEE Intl. Conf. on Data Engineering, pp. 467-478.

  112. E. Hung, L. Getoor, V.S. Subrahmanian: Probabilistic Interval XML. Proc. 2003 Intl. Conf. on Database Theory, Springer Lecture Notes in Computer Science, Vol. 2572, pp. 361-377.

  113. M. Fayzullin, V.S. Subrahmanian: An Algebra for PowerPoint Sources. Proc. 2002 Intl. Workshop on Multimedia Information Systems, pp. 155-164, Phoenix, Arizona.

  114. J. Dix, S. Kraus and V.S. Subrahmanian. Agents Dealing with Time and Uncertainty, Proceedings 2002 Intl. Conference on Autonomous Agents and Multiagent Systems, Bologna Italy, July 2002.

  115. R. Ross, V.S. Subrahmanian and J. Grant. Probabilistic Aggregates, Proc. 2002 Intl. Symp. On Methodologies for Intelligent Systems, Lyon, France, June 2002. Springer lecture Notes in computer science.

  116. F. Ozcan, V.S. Subrahmanian and L. Golubchik. Optimal Agent Selection, in: Proc. KI-2001 (Austrian/German conference on Artificial Intelligence), Lecture Notes in Computer Science, Springer Verlag, Sep. 2001.

  117. F. Ozcan and V.S. Subrahmanian. Partitioning Activities for Agents, in: Proc. 2001 Intl. Joint Conference on Artificial Intelligence, Seattle, WA, Aug. 2001.

  118. V.S. Subrahmanian. Heterogeneous Agent Systems, Invited Talk, Proc. 1999 Intl. Symp. on Methodologies for Intelligent Systems (eds. Z. Ras and A. Skowron), Lecture Notes in Computer Science, Vol. 1609, pp. 46-55, Springer Verlag.

  119. A. Dekhtyar, M. Dekhtyar and V.S. Subrahmanian. Temporal Probabilistic Logic Programs, Proc. 1999 Intl. Conf. on Logic Programming, pp. 109-123 New Mexico, Nov. 1999.

  120. A. Dekhtyar, M. Dekhtyar and V.S. Subrahmanian. Hybrid Probabilistic Programs: Algorithms and Complexity, Proc. 1999 Intl. Conf. on Uncertainty in Artificial Intelligence, July 1999, Stockholm, Sweden.

  121. S. Adali, M.L. Sapino, and V.S. Subrahmanian. A Multimedia Presentation Algebra, Proc. 1999 ACM SIGMOD Conference on Management of Data, Philadelphia, PA.

  122. K.S. Candan, E. Lemar, V.S. Subrahmanian. Management and Rendering of Multimedia Views, Proc. 4th Intl. Workshop on Multimedia Information Systems, Springer Verlag Lecture Notes in Computer Science, Vol. 1508, Sep. 1998.

  123. P. Bonatti, S. Kraus, J. Salinas and V.S. Subrahmanian. Data-Security in Heterogeneous Agent Systems, in M. Klusch editor, Cooperative Information Agents, Springer-Verlag, Springer-Verlag, 1998, pp. 290—305.

  124. S. Adali, P. Bonatti, M.L. Sapino and V.S. Subrahmanian. A Multi-Similarity Algebra, Proc. 1998 ACM SIGMOD Conference on Management of Data, June 1998, Seattle, WA.

  125. E. Hwang, P. Prabhakaran, and V.S. Subrahmanian. Distributed Video Presentations, in Proc. 1998 IEEE Intl. Conf. on Data Engineering.

  126. T. Eiter, J. Lu and V.S. Subrahmanian. (1997) Computing Non-Ground representations of Stable Models, Proc. 1997 Intl. Conference on Logic Programming and Non-monotonic Reasoning, Dagstuhl, Germany, July 1997. Springer Verlag.

  127. A. Dekhtyar and V.S. Subrahmanian. (1997) Hybrid Probabilistic Programs, Proc. 1997 Intl. Conf. on Logic Programming, Leuven, Belgium, July 8-12, 1997. Recipient of the "20 Year Test of Time Award”from the 2017 International Conference on Logic Programming, Melbourne, Australia, Aug 2017.

  128. S. Jajodia, P. Samarati and V.S. Subrahmanian. (1997) A Logical Language for Expressing Authorizations, Proc. 1997 Oakland Conf. on Computer Security. This is one of the most highly cited papers on Relational Databases according to http://citeseer.ist.psu.edu/Databases/Relational/

  129. E. Bertino, S. Jajodia, P. Samarati and V.S. Subrahmanian. (1997) A Unified Framework for Enforcing Multiple Access Control Policies, Proc. 1997 ACM SIGMOD Conf. on Management of Data, Tucson, Arizona, May 1997.

  130. K.S. Candan, B. Prabhakaran, and V.S. Subrahmanian. (1996) CHIMP: A Framework for Supporting Multimedia Document Authoring and Presentation, Proc. 1996 ACM Multimedia 1996 Conference, Boston, MA, Nov. 1996.

  131. P. Bonatti, M.-L. Sapino and V.S. Subrahmanian. (1996) Merging Heterogeneous Security Orderings, Proc. European Symposium on Research in Computer Security (ESORICS), Sep. 1996, Springer LNCS Vol. 1146, pp. 183-197.

  132. A Deductive Database Approach to Planning in Uncertain Environments, Proc. 1996 Intl. Workshop on Logic in Databases, San Miniato, Italy, July 1-2, 1996. (with Charlie Ward).

  133. Towards a Theory of Collaborative Multimedia, Proc. 1996 IEEE Multimedia Systems Conference, pp. 279-283, Hiroshima, Japan, June 1996. (with K.S. Candan and P.V. Rangan).

  134. Query Processing in Distributed Mediated Systems, in: Proc. 1996 ACM SIGMOD Conf. on Management of Data, Montreal, Canada, June 1996. (with S. Adali, K.S. Candan and Y. Papakonstantinou).

  135. The PARK Semantics for Active Rules,: Proc. 1996 Intl. Conf. on Extending Database Technology, Avignon, France, March 1996. (with G. Gottlob and G. Moerkotte).

  136. Secure Mediated Databases, in: Proc. 1996 Intl. Conf. on Data Engineering, Feb. 1996, New Orleans, LA. (with K.S. Candan and S. Jajodia).

  137. Sibel Adali and V.S. Subrahmanian. Intelligent Caching in Hybrid Knowledge Bases, in: Proc. 1995 Intl. Conf. on Very Large Knowledge Bases (ed. N. Mars), pp. 247-256, IOS Press, Twente, The Netherlands, May 1995.

  138. J. Lu, G. Moerkotte, J. Schue, and V.S. Subrahmanian. Efficient Maintenance of Materialized Mediated Views, in: Proc. 1995 ACM SIGMOD Conf. on Management of Data, San Jose, CA, May 1995. This is one of the most highly cited papers in deductive databases according to http://citeseer.ist.psu.edu/Databases/Deductive/

  139. V.S. Subrahmanian and C. Zaniolo. Relating Stable Models and AI Planning Domains, in: Proc. 1995 Intl. Conf. on Logic Programming, Tokyo, Japan.

  140. J. Benton and V.S. Subrahmanian. Using Hybrid Knowledge Bases for Missile Siting Problems, Proc. 1994 Conf. on Artificial Intelligence Applications, pp. 141-148, IEEE Computer Society.

  141. V.S. Subrahmanian. Hybrid Knowledge Systems, Proc. 7th Space Operations, Applications and Research Symp., pp. 218-225, Aug. 1993, Houston, Texas.

  142. V.S. Subrahmanian. Hybrid Knowledge Bases for Intelligent Reasoning Systems, Invited Address, Proc. 8th Italian Conf. on Logic Programming, pp. 3-17, Gizzeria, Italy, June 1993.

  143. C. Bell, A. Nerode, R. Ng and V.S. Subrahmanian. Implementing Stable Semantics by Linear Programming, Proc. 1993 Intl. Workshop on Logic Programming and Nonmonotonic Reasoning, pp. 23-42, Lisbon, Portugal, June 1993. MIT Press.

  144. A. Gupta, I.S. Mumick and V.S. Subrahmanian. Maintaining Views Incrementally, Proc. 1993 ACM SIGMOD Conf. on Management of Data, pp. 157-165, Washington, DC. (with A. Gupta and I. S. Mumick).

  145. X. Wang, S. Jajodia and V.S. Subrahmanian. Temporal Modules: An Approach Toward Federated Temporal Databases, Proc. 1993 ACM SIGMOD Conf. on Management of Data, pp. 227-236, Washington DC. This is one of the most highly cited papers in databases according to http://citeseer.ist.psu.edu/Databases/

  146. P. Bonatti, S. Kraus and V.S. Subrahmanian. Declarative Foundations of Secure Deductive Databases, Proc. 1992 Intl. Conf. on Database Theory, Lecture Notes in Computer Science, Vol. 646, pp. 391-406, Springer.

  147. R. Ng and V.S. Subrahmanian. Empirical Probabilities in Monadic Deductive Databases, Proc. 8th Intl. Conf. on Uncertainty in Artificial Intelligence, pp. 215-222, Morgan Kaufmann, July 1992.

  148. K. Erol, D. Nau and V.S. Subrahmanian. On the Complexity of Domain-Independent Planning, Proc. 1992 Conf. of the American Association for Artificial Intelligence (AAAI-92), pp.. 381-386, MIT Press, July 1992.

  149. K. Erol, D. Nau and V.S. Subrahmanian. When is Planning Decidable?, Proc. First Intl. Conf. on AI Planning Systems, (ed. J. Hendler), pp. 222-227, Morgan-Kaufmann, June 1992.

  150. C. Bell, A. Nerode, R. Ng and V.S. Subrahmanian. Implementing Deductive Databases by Linear Programming, Proc. 1992 ACM SIGMOD/SIGACT/SIGART Symp. on Principles of Database Systems, pp. 283-291, San Diego, May 1992.

  151. R. Ng and V.S. Subrahmanian. Stable Model Semantics for Probabilistic Deductive Databases, Proc. 1991 Intl. Symp. on Methodologies for Intelligent Systems, pp. 162-171, Springer Verlag.

  152. R. Ng and V.S. Subrahmanian. Relating Dempster-Shafer Theory to Stable Semantics, Proc. Intl. Logic Prog. Symp., pp. 551-565, San Diego, Oct. 1991, MIT Press.

  153. C. Baral and V.S. Subrahmanian. Dualities Between Alternative Semantics for Logic Programming and Non-Monotonic Reasoning, in: Proc. First International Workshop on Logic Programming and Non-Monotonic Reasoning, pp. 69-86, MIT Press, July 1991.

  154. R. Ng and V.S. Subrahmanian. Non-Monotonic Negation in Probabilistic Deductive Databases, in: Proc. 7th Intl. Conf. on Uncertainty in Artificial Intelligence, pp. 249-256, Morgan Kaufmann, July 1991.

  155. R. Ng and V.S. Subrahmanian. A Semantical Framework for Supporting Subjective and Conditional Probabilities in Deductive Databases, Proc. Intl. Conf. on Logic Programming, 1991, pages 565-580

  156. J. Minker and V.S. Subrahmanian. Completion Theoretic Semantics for Disjunctive Logic Programs, Proc. 1990 Int. Symp. on Methodologies for Intelligent Systems, pp. 545-552, Knoxville, Tennessee, North Holland. Aug. 1990.

  157. N.C.A. da Costa, L.J. Henschen, J. Lu and V.S. Subrahmanian. Automatic Theorem Proving in Paraconsistent Logics: Theory and Implementation, in: Proc. 10th International Conference on Automated Deduction, Springer Lecture Notes in Computer Science Vol. 449, pp. 72-86, July 1990.

  158. T. Murata, V.S. Subrahmanian and T. Wakayama. A High-Level Petri Net Model for Reasoning in the Presence of Inconsistency, in: Proc. 11th International Conference on Applications and Theory of Petri Nets, Paris, France, June 1990.

  159. V.S. Subrahmanian. Algebraic Properties of the Space of Multivalued and Paraconsistent Logic Programs, in: Proc. 9th International conference on Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science Vol. 405, pp 56-67, Springer-Verlag, Dec. 1989.

  160. M. Kifer and V.S. Subrahmanian. On the Expressive Power of Annotation Based Logic Programs, Proc. 1989 North American Conference on Logic Programming, pp. 1069-1089 (Vol. 2), (eds. E. Lusk and R. Overbeek), Cleveland, Ohio, Oct. 1989, MIT Press.

  161. V. Digricoli, J. Lu and V.S. Subrahmanian. AND-OR Graphs Applied to RUE-Resolution, in: Proc. 11th International Joint Conference on Artificial Intelligence, pp. 354-358, Detroit, Michigan, Aug. 1989.

  162. W. Marek and V.S. Subrahmanian. The Relationship Between Logic Program Semantics and Non-Monotonic Reasoning, in: Proc. 6th International Conference on Logic Programming, (eds. G. Levi and M. Martelli), pp. 600-617, Lisbon, Portugal, June 1989, MIT Press.

  163. The Query Topology in Logic Programming, in: Proc. 1989 International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science Vol. 349, pp. 375-387, Springer Verlag. (with Aida Batarekh).

  164. Query Processing in Quantitative Logic Programming, Proc. 9th Conference on Automated Deduction, Lecture Notes in Computer Science Vol. 310, pp. 181-200, Springer, (eds. E. Lusk and R. Overbeek). May 1988.

  165. Intuitive Semantics for Quantitative Rule Sets, in: Proc. 5th International Conference/Symposium on Logic Programming, eds. R. Kowalski and K. Bowen, pp. 1036-1053, MIT Press, August 1988.

  166. Foundations of Metalogic Programming, Proc. of the Workshop on Meta-Programming in Logic Programming, (ed. John Lloyd), pp. 53-66, Bristol, England, June 1988.

  167. QUANTLOG: A System for Approximate Reasoning in Inconsistent Formal Systems, Proc. 9th Conference on Automated Deduction, Lecture Notes in Computer Science Vol. 310, pp. 746-747, Springer-Verlag, (eds. E. Lusk and R. Overbeek). (with Z. Umrigar). System Summary. May 1988.

  168. Semantical Equivalences of (Non-Classical) Logic Programs, in: Proc. 5th International Conference/Symposium on Logic Programming, eds. R. Kowalski and K. Bowen, pp. 960-977, MIT Press. (with A. Batarekh).

  169. On the Semantics of Quantitative Logic Programs, Proc. 4th IEEE Symp. on Logic Programming, pp. 173-182, Computer Society Press. Sep. 1987.

Accolades


Accolades for my book The Global Cyber Vulnerability Report

'' This book does something that almost no one has ever done before (and certainly not to this extent) - it seriously, and empirically, tests some common assumptions about cybersecurity. It succeeds in measuring, in objective terms, the degree of cybersecurity vulnerabilities of different states and compares them scientifically.''

Accolades for my book on Lashkar-e-Taiba

'' Aaron Mannes and V.S. Subrahmanian have produced a fascinating framework for a disciplined analysis of terrorist groups...''

'' This important book contains a number of policy suggestions that provide a framework which could help mitigate future LeT terror attacks, and ultimately save lives. As a former Director of National Intelligence, I know this book will be an invaluable asset to counter-terrorism analysts and policymakers. It is a must read.''

'' Lashkar-e-Taiba is perhaps the most dangerous jihadist group of global reach after al-Qaeda and is arguably the more complicated actor of the two. Understanding it requires creative thinking and analysis of exactly the sort VS Subrahmanian and Aaron Mannes offer in this important contribution to the growing Lashkar canon. Highly recommended for policymakers, practitioners and anyone interested knowing more about the South Asian region or transnational terrorism.''

'' The book presents a very pragmatic application of "Temporal Probabilistic Behavior Rules" and "Policy Analysis Methodology" to successfully attempting a possible solution to one of the most serious threat to the National Security of any sovereign country i.e. terrorism. The author's exemplary approach and visualization can be applied to solving a variety of other problems, including organized crimes, crime by mafias and even insurgency. With further fine tuning of the algorithms and methodology this unique approach could yield even far reaching results to the issues and challenges of public safety in general and national security in particular.''

'' With this monograph V.S. Subrahmanian and his collaborators offer a promising new predictive tool for the study of terrorist groups. Focusing on Pakistan’s militant Lashkar-e-Taiba, the authors use computational analysis to generate a set of relationships that confirm and extend our understanding of the relationship between various political environment factors and terrorist operations. These findings lead to several policy recommendations on means to reduce the likelihood of terrorist attacks. Although the Subrahmanian team has focused on a single organization, their analytic approach should have application to the study of Pakistan’s other terrorist organizations and those elsewhere. The book’s rich overview of Lashka-e-Taiba’s goals, organization, relationships and operations reveals a group with a deep domestic base and growing international reach that might in the future allow it to surpass Al Qaeda as a global threat.''

'' This book must be admired for its sheer novelty of approach in applying computational analysis to a most unusual subject. Analytical tools from diverse disciplines converge to provide the reader with an in-depth understanding of the secret world of terrorism. Fascinating!''

'' The first successful computational intelligence system for real time data mining of worldwide terrorism activities. Its signal importance is that It can provide to the counter terrorism community much needed timely group and site specific assessments of threats worldwide.''

'' The forthcoming work by the Univ Maryland would be unique and it certainly paves the way at least to popularize predictive modeling or use of scientific technique in studying social sciences like what this new book has followed. This book would certainly enthuse others to explore possibility to use this technique with other groups (e.g Al Qaeda in Yemen, Indian Mujaheddin etc ). It would help both policy makers and security agencies ... esp when they are investing in building huge database (open source and otherwise) on Terrorism, low intensity Conflicts. This book is different from the existing literature on LeT, I have read so far ... and it sheds some lights on what the terrorist group would probably do next.''

'' This book provides a thorough and systematic method to analyze the behavior of Laskhar-e-Taiba. Furthermore it provides a framework to analyze the behavior of any terror group and also to make forecasts and predictions about future actions of such a group. Hence, a must read for both the intelligence analyst faced with huge amounts of data and academic researchers working on computational methodology to analyze such organizations. Professor Subrahmanian and his team have set a new standard for the computational analysis of terrorist organizations.''

Accolades for my book on Indian Mujahideen

'' The writers have successfully revealed the inside workings of this dangerous terrorist group which is presently a major threat to the Country of India. By examining the origins, known supporters, and current tactics of the IM, this well-organized book succeeds in letting India gain a deep knowledge of the enemy targeting the national security of India and its economic prosperity.''

'' This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers.''

'' An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward.''

'' An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India’s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the “Indian Mujahideen” poses and realistically dwelt on the ways in which these challenges could be faced and overcome.''

'' The authors need to be complimented for attempting a mathematical definition of a policy against the IM, for a sound analysis of the IM, and for offering some very sound operational suggestions. It is particularly creditable that the book, even though it deals with such a serious subject, is eminently readable by lay persons and therefore should educate them on a subject that is extremely relevant.''

Keynote


Keynotes & Invited Talks

  1. Invited Talks (2), Lviv Summer School in Data Science organized by the National Academy of Science, Engineering, and Medicine, Lviv, Ukraine, Aug 2023.

  2. Invited Talk, WORKSHOP: WHAT PIOs NEED TO KNOW ABOUT MISINFORMATION DURING AN EMERGENCY RESPONSE, National Homeland Security Conference, Chicago, IL, July 2023.

  3. Invited Talk, Climate Security and Violent Extremism: From Research to Climate-based Risk Assessments and Programming Side Event on the margins of the Third United Nations Counter-Terrorism Week, June 2023.

  4. Invited Panelist, Indo-Pacific Geointelligence, Delhi, June 2023.

  5. Invited Panel Chair on a Panel on Geo4SDGs, Geospatial World Forum, Rotterdam, Netherlands, May 2023.

  6. Keynote Address, ITASEC 2023 Italian Conference on Cybersecurity, Bari, Italy, May 2023.

  7. Invited Talk, Geospatial Summit, United Nations (Dept. of Political & Peacebuilding Affairs), Feb 2023.

  8. Invited Talk, Workshop on “The Irresponsibility of a Narrow Debate on Military AI” at the Responsible use of AI in the Military (RE-AIM 2023), The Hague, Feb 2023. Organized by the Netherlands Ministry of Foreign Affairs.

  9. Keynote Address at a workshop at the First Global Summit on Responsible Artificial Intelligence in the Military Domain: REAIM 2023 organized by the Netherlands Ministry of Defense, The Hague, Feb 2023.

  10. Invited Talk, West African Conference on Machine Learning/AI and Terrorism Prediction, (via Zoom), Ougadougou, Burkina Faso, November 2022.

  11. Keynote Address, TCS TACTiCS regional conference for North America - Latin America, Nov 2022.

  12. Invited Talk, Dept. of Homeland Security, October 2022.

  13. Invited Talk, Illinois Ignite 2022, Chicago, September 2022.

  14. Invited Talk, Foundation Day Lecture of Society for Electronic Transactions and Security (SETS), India, June 2022.

  15. Invited Talk, DARPA SocialCyber AI Exploration PI meeting, June 2022.

  16. Invited Panel, TCS Industry Panel on Future of Cyber Risk & Insurance, May 2022.

  17. Keynote Address, Wells Fargo Confluence conference, Dec 2021.

  18. Invited Panel, TCS Innovation Day for India, Dec 2021.

  19. Invited Panel, Foreign Policy magazine TechForum, Nov 17 2021.

  20. Invited Talk, Resilience Week 2021, organized by Argonne National Lab, Oct 2021.

  21. Invited Tutorial, Netherlands Ministry of Defense MasterClass on Data Science & AI for Security, targeted at top Generals in the Netherlands Defense establishment.

  22. Keynote Speaker, 18th International, Conference on Security and Cryptography (SECRYPT 2021), July 2021.

  23. Keynote Speaker, UnitedHealth Group Healthcare Technology Advisory Council, June 30, 2021.

  24. Invited Talk (5-minute address) for Canadian National Rail Hackathon, June 2021, co-organized by CN Rail and Tata Consultancy Services.

  25. Keynote Speaker, Working Group on Children Recruited by Terrorist and Violent Extremist Groups ( “CRTG”) Live Briefing, April 29 2021.

  26. Keynote Speaker, 1st International Conference on Autonomous Intelligent Cyber-defence Agents, Paris France (but via Zoom), March 2021.

  27. Invited Speaker, United Nations UNCCT/UNOCT/UNICRI Meeting on Building Good Practices for the Use of Artificial Intelligence for Social Network Analysis, March 2021.

  28. Invited Talk, ai4 Virtual Conference on AI & Cybersecurity, Feb 2021.

  29. Keynote Speaker, 8th International Workshop on Parallel and Distributed Computing for Large-Scale Machine Learning and Big Data Analytics (ParLearning 2019), in conjunction with the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2019), Anchorage, Alaska, Aug 2019.

  30. Keynote Speaker, 17th International Conference on Practical Applications of Agents and Multi-Agent Systems, Avila, Spain, June 2019.

  31. Keynote Speaker, 14th International Conference on Information Systems Security, Bangalore, India, Dec. 2018.

  32. Plenary Speaker, The World Academy of Science General Meeting, Trieste, Italy, Nov 2018.

  33. Keynote Speaker, 2018 New York State Cybersecurity Conference, Albany, NY, June 2018.

  34. Invited Talk, Global AI Summit, New York,NY, Dec 2020.

  35. Invited Talk, Buffet Institute for Global Studies, Northwestern University, Chicago, Nov 2020.

  36. Invited Talk, 10th International Conference on Scalable Uncertainty Management, Bolzano, Italy, Sep 2020.

  37. Invited Talk, ai4 Virtual Conference on AI, Aug 2020.

  38. Invited Talk, National Institute for Advanced Studies, Bangalore, India, July 2020.

  39. Invited Talk, US Army Science Board, July 2020.

  40. Invited Talk, IEEE Hyderabad Chapter, May 2020.

  41. Invited Talk, University of Rome Italy, May 2020.

  42. Invited Talk, AAAS/Elsevier/SenseAboutScience talk on “AI: Pros & Cons” at the AAAS Annual Conference, Feb 2020, Seattle, WA.

  43. Invited Dinner Speaker, AAAS/Elsevier Dinner Speaker on Strengths & Weaknesses of Data Science, Feb 2020, Seattle, WA.

  44. Invited Speaker on Fake Documents, Institute for Information Infrastructure Protection (I3P) Webinar, Feb 2020.

  45. Invited Speaker at the Google Android Security Summit, Feb 2020.

  46. Dartmouth-Durham Global Debate on AI & Cybersecurity, Washington DC, Dec 2019.

  47. Dartmouth-Durham Global Debate on AI & Cybersecurity, New York City, Dec 2019.

  48. Invited Speaker to brief the President and other top executives of Samsung Electronics about "AI & Cybersecurity", Nov 2019.

  49. Invited Speaker, 2019 Digital Meet, Padua, Italy, Oct 2019.

  50. Invited Tutorial, 2019 Intl. Summer School on Machine Learning & Cybersecurity, Padua, Italy Sep 2019.

  51. Keynote Speaker, 8th International Workshop on Parallel and Distributed Computing for Large-Scale Machine Learning and Big Data Analytics (ParLearning 2019), in conjunction with the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2019), Anchorage, Alaska, Aug 2019.

  52. Invited Speaker, 2019 ADP Executive Security Leadership Meeting, ADP Inc. (America’s biggest payroll processing company), Hanover, NH, July 2019.

  53. Invited Speaker, 13th International Conference on Flexible Query Answering Systems, Amantea, Italy, July 2019.

  54. Plenary Speaker, 17th Intl. Conf. on Practical Applications of Agents & Multiagent Systems, Avila, Spain, June 2019.

  55. Invited Speaker, Logic Programming & Non-Monotonic Reasoning Conference, Philadelphia, PA, June 2019.

  56. Invited Speaker, Workshop on AI & Cybersecurity, Leiden, Netherlands, June 2019.

  57. Keynote Speaker, 14th International Conference on Information Systems Security, Kolkata, India Dec 2018.

  58. Invited Speaker, General Assembly of The World Academy of Science, Trieste, Italy, Nov 2018.

  59. Invited Speaker, Israeli National Cybersecurity Conference, Tel Aviv, June 2018.

  60. Invited Speaker, 2018 ARO Workshop on Cyber Deception, College Park, MD Aug 2018.

  61. Invited Speaker, ParSocial 2018, Vancouver, BC, May 2018.

  62. Invited Speaker, 12th IEEE Intl. Conf. on Semantic Computing, Newport Beach, CA, Feb 2018.

  63. Invited Speaker, 2017 World Science Forum, Amman, Jordan, Nov. 2017 in the plenary session titled "The Opportunities and Challenges of Digital Transformation".

  64. Invited Speaker, 2017 Conference on Decision and Game Theory for Security (GameSec 2017), Vienna, Austria, Oct 2017.

  65. Invited Speaker, 2017 Israeli National Cybersecurity Conference, Tel Aviv, June 2017.

  66. Invited Speaker, 2017 Capital One Bank Data Intelligence Conference, June 2017.

  67. Invited Speaker, The Middleburg Forum, Middleburg, VA, April 2017. Previous speakers in this series include Sandra Day O’Connor, David Ignatius, Hedrick Smith, and others.

  68. Invited Speaker, 2017 Big Data Winter School, Bari, Italy, Feb 2017.

  69. Invited Panelist, 2017 UNISSIG Conference of CISOs of UN Group Organizations, Geneva, Switzerland, January 2017. Another member of this panel included ITU Secretary General Houlin Zhao.

  70. Invited Speaker, 12th International Conference on Information System Security, Jaipur, India, Dec 2016.

  71. Invited Speaker, Workshop on Data Mining for Cyber-Security, Barcelona, Spain, Dec 2016, in conjunction with ICDM 2016.

  72. Invited Speaker, United Nations Counter Terrorism Committee Executive Directorate (CTED) technical meeting, UN Headquarters, NY, Nov. 2016. http://webtv.un.org/watch/session-i-preventing-the-exploitation-of-information-and-communications-technologies-for-terrorist-purposes-while-respecting-human-rights-and-fundamental-freedoms/5229657438001

  73. Invited Speaker, Science Media Awards & Summit in the Hub, Boston, Sep 2016.

  74. Invited Speaker, Social Data and Analytics DC, Washington DC, Sep 2016.

  75. Keynote Speaker, ADCOM-2016, Advanced Computing and Communications Society, Bangalore, India, Sep 2016.

  76. Invited Speaker, Israel National Cyber-Security Conference, Tel Aviv, June 2016.

  77. Invited Speaker, Fourth International Conference on Data Mining for Business Intelligence, Beer-Sheva, Israel, May 2016.

  78. Invited Panelist, Foundation for the Defense of Democracy Panel on "Global Cyber-Vulnerabilities: Threats, Challenges, and Opportunities" moderated by David Sanger (Chief National Security correspondent for the New York Times) and including former US Deputy Assistant Attorney General Luke Dembosky and counter-terrorism expert Daveed Gartenstein Ross. March 2016. Video at http://youtu.be/m7Ycg_POGco

  79. Invited Participant, US-India Strategic Dialog (track 2) organized by the Aspen Institute and the Ananta Aspen Center, Dec 2015.

  80. Invited Speaker, Conf. on Knowledge Discovery & Data Analysis, Algiers, Nov 2015.

  81. Invited Speaker, Israel National Cyber-Security Conference, Tel-Aviv, June 2015.

  82. Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy, June 2015.

  83. Invited Speaker, Cyber-Security and Resilience Conference, Bombay Stock Exchange, Mumbai, India, April 2015.

  84. Invited Participant, India-Israel Dialog (track 2), New Delhi, Dec 2014.

  85. Invited Speaker, 4th Annual International Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime Minister Office and the Interdisciplinary Cyber Research Center (ICRC), Sep 2014.

  86. Commencement/Graduation Speaker, PES Institute of Technology, Bangalore, India, Sep 2014.

  87. Keynote Speaker, Cyber and Infrastructure Crime & Security Track, IEEE Joint Intelligence and Security Informatics Conference, The Hague, Sep 2014.

  88. Invited Speaker, 2014 IFIP Security Conference, Marrakech, Morocco, June 2-4, 2014.

  89. Invited Speaker, NISA (Netherlands Intelligence Studies Association) Conference on Social Media Intelligence, Netherlands, March 7 2014.

  90. Invited Participant, US-India Strategic Dialog (track 2), Washington DC, Feb 8-10, 2014.

  91. Invited Speaker, Aspen Institute, Kolkata India (Jan 20 2014) and New Delhi (Jan 24 2014).

  92. Invited Speaker on Cybersecurity and Member, India Israel Strategy Forum, Tel Aviv, Oct 28-30, 2013.

  93. Invited Panel, Cyber-Security Financing Forum, Washington DC, Oct 21-22, 2013.

  94. Invited Lecture, Aspen Institute and US Consulate General – Mumbai, May 30, 2013.

  95. Invited Lecture, Observer Research Foundation, May 29, 2013, New Delhi.

  96. Keynote Speaker, Sentiment Analysis Symposium, May 2013, New York City.

  97. Invited Speaker on Cybersecurity, US-India Strategic Dialog, Jan 12-13, 2013, lhi.

  98. Invited Speaker, Aspen Institute, "Using IT to Fight Terrorism and Increase Security", Jan 9, 2013, New Delhi. Public lecture. Viewable at http://www.youtube.com/watch?v=4YOSkdv1R84&list=UUIvdd1ncT8Z9OtE6gEXc8HQ&index=1

  99. Invited Speaker, the AAAI Fall Symposium on Social Networks and Social Contagion, Nov. 2-4, 2012, Washington DC.

  100. Invited Speaker, Dutch Police Symposium on "Knowledge and Models", The Hague, Dec. 2012.

  101. Keynote Speaker, Computer Society of India Annual Convention, Dec. 1-2, 2012 Kolkata, India.

  102. Keynote Speaker, Sentiment Analysis Symposium, Oct. 2012, San Francisco, CA. (Cancelled due to Hurricane Sandy).

  103. Invited Speaker, Workshop on Data Management in the Social Semantic Web (DMSW-12), Istanbul, Turkey, Aug. 26-30, 2012.

  104. Invited talk, 2011 Italian Database Conference (SEBD 2011), Maratea, Italy, June 2011.

  105. Invited Talk, 2011 Bar-Ilan Symposium on Foundations of Artificial Intelligence, Bar-Ilan University, Israel, June 2011.

  106. Invited lecture on ICT Platforms for Regional and Global Human Resources Development Education presented at the "Regional Integration and Human Resources Development in S&T Fields", organized by the American Association for the Advancement of Science and the Government of Rwanda, Dec. 2010.

  107. Invited lecture, 2009 International Conference on Computational Cultural Dynamics, College Park, MD, Dec. 2009.

  108. Invited lecture, 2009 International Conference on Database Engineering and Applications Symposium (IDEAS 2009), Cetraro, Italy, Sep. 2009.

  109. Keynote addres, Proc. 2008 First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction, Phoenix, April 1-2, 2008.

  110. Invited talk, Fourth Conference on Mathematical Methods in Counter-terrorism, Rochester, NY, Sep. 20-22, 2007.

  111. Invited talk, International Conference on Computational Cultural Dynamics, Aug. 2007.

  112. Invited talk, "Research on Computational Cultural Reasoning", Capitol Hill, June 14, 2007. Attended by US Congressional representatives Rep. Adam Smith (D-WA), Rep. Jim Cooper (D-TN) and Rep. Jim Saxton (R-NJ) as well as several staffers from the offices of various Congressmen and Senators. Organized by AAAS.

  113. Invited tutorial on Service-Oriented Architectures, Disruptive Technology Office InfoX Conference, Dallas, Texas, March 2007.

  114. Invited Talk, Ontologies, Databases and Applications of Semantics (ODBASE 2005), Oct/Nov. 2005, Agia Napa, Cyprus.

  115. Invited Talk, 2004 International Workshop on Monitoring, Security, and Rescue Tasks in Multi-Agent Systems 2004 (MSRAS 2004), Poland, June 2004.

  116. Keynote address, 3rd International Conf. on Mobile and Ubiquitious Multimedia (MUM2004), College Park, MD, Oct. 2004.

  117. Keynote address, 2004 IEEE International Conf. on Multiagent Security and Survivability, Philadelphia, PA, Aug. 2004.

  118. Keynote Address 2004 Conference on Computational Logic in Multiagent Systems, Jan 2004, Ft. Lauderdale, FL.

  119. Invited tutorial on Multimedia Presentations. 9th International Workshop on Multimedia Information Systems, Ischia, Italy, May 2003.

  120. Keynote Address 2003 "Symposium on Logic based Agent Implementation" Barcelona, Spain, Feb. 2003

  121. Invited talk: NETTAB 2002 workshop on Agents in Bioinformatics, July 12-14, 2002, Bologna, Italy.

  122. Invited tutorial: SOFSEM 2002, Slovakia, November 2002. Had to cancel tutorial for unforeseen reasons.

  123. Invited tutorial: JELIA 2002, Sep. 2002, Calabria, Italy. Had to cancel tutorial for unforeseen reasons.

  124. Keynote address: 2001 International Conference on Multimedia Information Systems, Capri, Italy, Nov. 2001.

  125. Keynote Address: 1998 Intl. Workshop on Query Processing and Multimedia Issues in Distributed Systems, August 26-27, Vienna, Austria.

  126. Invited talk: 24th Austrian/German Conference on Artificial Intelligence, Vienna, Austria, Sep. 19-21, 2001.

  127. Invited talk: International Workshop on Agent Oriented Information Systems, June 2001, Interlaken, Switzerland.

  128. Jon Postel Distinguished Lecture Series at UCLA, March 2001.

  129. Invited Tutorial: Multimedia Database Systems, IEEE Intl. Conf. and Multimedia Expo, New York City, July 2000.

  130. Invited Talk: 1999 Intl. Symposium on Methodologies for Intelligent Systems (ISMIS-99), Warsaw, Poland, June 8-11, 1999.

  131. Invited Talk: ALP/UK and Compulog Workshop on Logic Programming and Distributed Knowledge Management, April 1999, London, UK.

  132. 5 Invited Lectures on Logic-Based Heterogeneous Information Integration, GULP Summer School in Logic Programming, Acquafredda di Maratea, Italy, Sep. 7-12, 1998.

  133. "Interestingness", Invited Talk, 1997 Intl. Workshop on Logic Programming and Non-Monotonic Reasoning, Dagstuhl, Germany.

  134. Invited tutorial: 1996 Italian Conf. on Databases (SEBD-96), Gizzeria, July 1996.

  135. Invited address: 1995 Workshop on Implementations of Nonmonotonic Reasoning, International Joint Conf. on Artificial Intelligence, Montreal, Aug. 1995.

  136. Invited address: 1995 Intl. Conf. on Uncertainty in Artificial Intelligence, Montreal, Aug. 1995.

  137. Invited Lectures: Italian Summer School on Databases and Knowledge Bases, Lipari, Italy, July 1995.

  138. Invited address: 1995 Intl. Conf. on Tools for Artificial Intelligence, Washington, DC 1995.

  139. "Hybrid Knowledge Bases for Intelligent Reasoning Systems", Proc. 1994 Intl. Workshop on Pattern Recognition in Practice, Vlieland, Holland.

  140. "Heterogeneous Knowledge Systems", workshop on Hybrid Control and Autonomous Systems, Ithaca, NY, Oct. 1994.

  141. "Hybrid Knowledge Bases", 1993 GULP Conference (Italian Conference on Logic Programming), June 1993.

  142. Invited tutorial on "Semantics of Logic Programs", 1993 Intl. Conf. on Logic Programming, Budapest, Hungary, June 1993.

  143. "Hybrid Knowledge Bases", Army Workshop on “Mathematical and Computer Science Issues in Virtual, Distributed Interactive Simulations,” Research Triangle Park, NC, May 1993.

  144. "Deduction as Optimization: The LOP Project", Workshop on Autonomous Control - 2nd Intl. Symp. on Artificial Intelligence and Mathematics, Ft. Lauderdale, Florida, 1993.

Media


  1. D. Byman, C. Meserole, and V.S. Subrahmanian. The Deepfake Dangers Ahead, The Wall Street Journal, Feb 23 2023 (online), Feb 25 2025 (print edition). https://www.wsj.com/articles/the-deepfake-dangers-ahead-b08e4ecf?mod=Searchresults_pos1&page=1

  2. V.S. Subrahmanian. Cybersecurity Needs a New Alert System, The Wall Street Journal, March 29 2021, https://www.wsj.com/articles/cybersecurity-needs-a-new-alert-system-11617039278?mod=opinion_lead_pos5

  3. V.S. Subrahmanian, A. Mannes, and R.K. Raghavan, No More Carrots, Only Sticks, The Hindu, April 18 2015, http://www.thehindu.com/opinion/op-ed/pakistan-continues-to-support-terror-across-borders/article7114110.ece?homepage=true

  4. A. Mannes, R.K. Raghavan, A. Roul, and V.S. Subrahmanian, Intelligent Security,Indian Express, Sep 5 2013, http://www.indianexpress.com/news/intelligent-security/1164726/

  5. V.S. Subrahmanian. Introducing the Software that can Predict New Leaders of Terror Groups, The Guardian/Observer (UK), Sep 14 2013. Also in the print edition of the Observer, Sep 15 2013. http://www.theguardian.com/world/2013/sep/15/al-qaida-terrorist-leader

  6. A. Mannes, R.K. Raghavan, A. Roul, and V.S. Subrahmanian, Penetrating the Web of Terror, The Hindu, Nov 2, 2013, http://www.thehindu.com/opinion/lead/penetrating-the-web-of-terror-networks/article5305816.ece

  7. A. Mannes, R.K. Raghavan, A. Roul, and V.S. Subrahmanian, Chennai Train Blasts: Why Indian Mujahideen cannot be Ruled Out, First Post, May 2 2014, http://www.firstpost.com/india/chennai-train-blasts-why-indian-mujahideen-cant-be-ruled-out-1504749.htmldisqus_thread

  8. A. Mannes, V.S. Subrahmanian, Gaming: Tactical Advantage, New York Sun, Nov. 14, 2007. http://www.nysun.com/opinion/gaming-tactical-advantage/66447/

  9. V.S. Subrahmanian, A. Mannes$, Keeping Tabs on Terrorists, Wall Street Journal (Asia Edition), Aug. 22, 2010. http://www.wsj.com/articles/SB10001424052748703461504575444634020591798

  10. A. Mannes, R. Silva, V.S. Subrahmanian, More Military Aid to Pakistan, The Huffington Post, Nov. 22, 2010. http://www.huffingtonpost.com/aaron-mannes/more-military-aid-to-paki_1_b_786959.html.

Blogs

  1. http://x-journals.com/2009/military-scenerios-through-virtual-worlds/

  1. Interviewed by the Austrian Broadcasting Co. for their MATRIX radio program in Sep. 2001. http://matrix.orf.at/bkframe/011021_1.htm

  2. Interviewed by several TV channels in Naples Italy in Nov. 2002.

  3. Featured on Canale 8, Italia Mia, Telenapoli, Canale 7, Tele Regione, TVA, Tele A, Napolitivu. : Multimedia Systems, Naples, Italy, Nov. 8-9, 2003.

  4. Baltimore Daily Record, Feb 1, 2003. http://www.mddailyrecord.com/pub/3_176_statewide/businessnews/126636-1.html

  5. Mentioned in Maryland Gazette, Feb 2003. http://gazette.net/gazette_archive/2003/200306/takoma/news/142356-1.html

  6. Quoted in the Maryland Gazette, June 2005. http://gazette.net/gazette_archive/2005b/200523/business/news/279721-1.html

  7. Work on STORY described in ComputerWorld, Sep. 12, 2005.

  8. Work on OASYS described in ComputerWorld, Aug. 21, 2006.

  9. Work on OASYS described in Panorama magazine, Sep. 21, 2006.

  10. Work on OASYS described in RAI Television, Italy, Nov. 2006.

  11. An article on OASYS appeared in Sci.cam, Italy. http://www.sci-cam.it/index.php?option=com_content&task=view&id=7&Itemid=43, May 2007.

  12. Work on computational cultural dynamics described in Science, Vol. 316, April 2, 2007, pp. 534-535. Available online at http://www.sciencemag.org/cgi/reprint/316/5824/534.pdf.

  13. An article on my work on computational cultural reasoning appeared on the home page of AAAS http://www.aaas.org/news/releases/2007/0625insurgents.shtml - June 25. 2007.

  14. An article titled "Can computer-driven Models help to Quell Insurgent-driven Strife and Instability" discussed my AAAS sponsored talk on Capitol Hill. http://www.allamericanpatriots.com/48725699_computers_can_computer_models_help_quell_insurgent_drive_strife_and_instability

  15. V.S. Subrahmanian was quoted in Science Magazine discussing a new Department of Defense funding initiative to improve expertise in national security, July 20, 2007.

  16. Article on my work in The New Scientist magazine by Tom Simonite titled "A Model World". www.newscientist.com/blog/technology/2007/09/model-world.html. Sep. 13, 2007.

  17. Article on my work on computational cultural models in ACM Tech News, Sep. 14, 2007. http://technews.acm.org/

  18. Article on my work on computational cultural models in ZEE News, Sep. 16, 2007, India. http://news.google.com/news/url?sa=t&ct=us/0-0&fp=46f7b9023d182ca3&ei=7vT3RoqxLZWgavL54eIP&url=http%3A//www.zeenews.com/znnew/articles.asp%3Faid%3D395278%26ssid%3D29%26ssname%3DNet%2520News%26sid%3DENV%26sname%3D&cid=0

  19. Article on my work on computational cultural models in Hindustan Times, New Delhi, Sep. 17, 2007.

  20. Voice of America TV program on my work on computational cultural models. Channel: Headlines Today, Show: The World Today, Time: Sunday 6 PM; India time, Sunday 8:30 AM; US time and Monday 1 PM; India time, Monday 3:30 AM; US time.

  21. Quoted in the Washington Post (October 8) on the UMD-Google-IBM Initiative on Cloud Computing.

  22. Featured in the Swiss Public Radio program under "Computerspiel-Designer" (Dec. 8, 2007) – this program focused on my work on computational cultural models and its relationship to games. www.wissenschaft.drs.ch

  23. Work on computational cultural dynamics extensively discussed in an op-ed piece in the Manila Sunday Times, Jan. 13, 2008, http://www.manilatimes.net/national/2008/jan/13/yehey/opinion/20080113opi2.html

  24. WBAL-TV 11, Baltimore, MD. Friday, April 4, 2008.

  25. Telepolis, German. March 30, 2008 http://www.heise.de/tp/r4/html/result.xhtml?url=/tp/r4/artikel/27/27564/1.html&words=Marcus%20born&T=marcus%20born

  26. New Scientist Magazine, March 15, 2008 http://technology.newscientist.com/channel/tech/mg19726476.000-can-conflict-forecasts-predict-violence-hotspots.html

  27. Financial Express India, March 03, 2008 http://www.financialexpress.com/news/Mapping-the-mind-of-a-terrorist/279471/

  28. NewsTrack India, March 5, 2008 http://www.newstrackindia.com/newsdetails/2636

  29. Times of India, March 2, 2008 http://timesofindia.indiatimes.com/Now_terrorists_behaviour_pattern_on_Internet/articleshow/2830619.cms

  30. Sinlungnews.com Singapore. http://www.sinlung.com/?p=491

  31. Information Week, Feb 28, 2008. http://www.informationweek.com/news/management/showArticle.jhtml;jsessionid=C44ZL5NQ2NDCWQSNDLPSKH0CJUNN2JVN?articleID=206900907&_requestid=420080

  32. TV Interview, Canada AM, Canadian Public TV Interview, Feb 29, 2008.

  33. Hindustan Times, India, March 2, 2008. http://www.hindustantimes.com/StoryPage/StoryPage.aspx?id=ad71d87a-0a8d-478e-82ea-2051921a91f4&&Headline=Terrorists'+behaviour+mapped+online

  34. American Public Media FutureTense program, broadcast on over 100 US Public Radio Station. Feb 28, 2008. http://www.publicradio.org/columns/futuretense/2008/02/28.shtml015991

  35. TechTree India, Feb 29, 2008. http://www.techtree.com/India/News/STOP_Terrorism_Software_Developed/551-87233-580.html

  36. Government Computer News, Feb 27, 2008. http://www.gcn.com/online/vol1_no1/45888-1.html

  37. Computerworld, Feb 26, 2008. This article contains some factual errors. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9064938

  38. WhatPC UK, Feb 26, 2008. http://www.whatpc.co.uk/vnunet/news/2210496/researchers-engineer-software

  39. Information World Review (UK), Feb 26, 2008. http://www.iwr.co.uk/information-world-review/news/2210503/researchers-promise-stop

  40. Network World, Feb 26, 2008. http://www.networkworld.com/news/2008/022608-college-launches-data-portal-for.html

  41. CIO Magazine, College launches data portal for counter-terrorism research, Feb 26, 2008, http://www.cio.de/news/cio_worldnews/851001/

  42. Accountancy Age, Feb 26, 2008, Researchers promise to Stop terrorists, http://www.accountancyage.com/vnunet/news/2210496/researchers-engineer-software

  43. Digital Trends, Feb 27, 2008. http://news.digitaltrends.com/news/story/15877/software_to_fight_terrorism

  44. Daily India, Feb 27, 2008. http://www.dailyindia.com/show/219884.php/Indian-origin-researcher-unveils-STOP-terrorism-software

  45. Malaysia Sun, Feb 27, 2008. http://story.malaysiasun.com/index.php/ct/9/cid/d805653303cbbba8/id/331644/cs/1/

  46. Top News, India. Feb 27, 2008. http://www.topnews.in/indian-origin-researcher-unveils-stop-terrorism-software-222706

  47. Thaiindian.com, Feb 27, 2008. http://www.thaindian.com/newsportal/health/indian-origin-researcher-unveils-stop-terrorism-software_10021671.html

  48. IT News, Australia, Feb 26, 2008. http://www.itnews.com.au/News/70955,researchers-promise-to-stop-terrorists.aspx

  49. CRN UK, Feb 26, 2008. http://www.channelweb.co.uk/vnunet/news/2210496/researchers-engineer-software

  50. Computing UK, Feb 26, 2008. http://www.computing.co.uk/vnunet/news/2210496/researchers-engineer-software

  51. Security Management Magazine, June 2008 http://www.securitymanagement.com/article/calculating-margin-terror This article describes our work as "pioneering".

  52. The Beirut Daily Star, Oct. 22, 2008. http://www.dailystar.com.lb/article.asp?edition_id=1&categ_id=2&article_id=96992 This article includes a response from Hezbollah to our work.

  53. Danish National Broadcasting, Oct. 29, 2008.

  54. WAMU 88.5 National Public Radio, the Kojo Nnamdi Show, http://wamu.org/programs/kn/08/11/25.php Nov. 25, 2008.

  55. The Washington Post, Feb 16, 2009. My research with Jon Wilkenfeld on the use of computational methods for reasoning about terror groups was one of two pieces of research work highlighted in an article entitled "The Computer as a Road Map to Unknowable Territory". http://www.washingtonpost.com/wp-dyn/content/article/2009/02/15/AR2009021501794.html

  56. The Examiner.com, Thumbs up or down, the business of tracking opinions online. This article highlights my work on sentiment analysis and opinion mining. Sep. 2, 2009.

  57. Scientific American.com covered my work on virtual worlds for national security, Nov. 26, 2009. http://www.scientificamerican.com/article.cfm?id=virtual-war-games

  58. The following articles covered my article in Science on virtual worlds on national security:

    http://www.theregister.co.uk/2009/11/27/pentagon_war_matrix/

    http://education.tmcnet.com/news/2009/11/26/4503474.htm

    http://www.supercomputingonline.com/latest/building-real-security-with-virtual-worlds

    http://www.genengnews.com/news/bnitem.aspx?name=69571060&taxid=0

    http://www.rdmag.com/News/Feeds/2009/11/policy-building-real-security-with-virtual-worlds/

    http://www.sciencedaily.com/releases/2009/11/091126173029.htm

    http://www.sciencecentric.com/news/article.php?q=09112703-building-real-security-with-virtual-worlds

    http://www.scienceblog.com/cms/building-real-security-virtual-worlds-27585.html

    http://www.newsguide.us/education/science/Building-real-security-with-virtual-worlds/

    http://www.zibb.com/article/5695481/Building+Real+Security+With+Virtual+Worlds

    http://www.tradingmarkets.com/.site/news/Stock%20News/2683238/

    http://www.redorbit.com/news/technology/1791689/building_real_security_with_virtual_worlds/index.html?

    http://esciencenews.com/articles/2009/11/26/building.real.security.with.virtual.worlds

    http://science-nature.marc8.com/building-real-security-virtual-worlds

    http://www.sciencecodex.com/building_real_security_with_virtual_worlds

    http://www.physorg.com/news178458781.html

    http://story.birminghamstar.com/index.php/ct/9/cid/d805653303cbbba8/id/570549/cs/1/

    http://story.albuquerqueexpress.com/index.php/ct/9/cid/a7925eab64637c1d/id/570549/cs/1/

    http://www.news.synavista.com/2009/11/building-real-security-with-virtual-worlds/

    http://www.congoo.com/news/2009November27/Virtual-worlds-provide-real-security

    http://www.andhranews.net/Technology/2009/November/27-Virtual-worlds-provide-41813.asp

    http://www.newkerala.com/nkfullnews-1-159396.html

    http://www.khabarexpress.com/27/11/2009-153800/Virtual-worlds-will-provide-real-security-says-Indian-origin-scientist-news_119628.html

    http://in.news.yahoo.com/139/20091127/981/tsc-virtual-worlds-will-provide-real-sec.html

    http://www.dailyindia.com/show/346599.php

    http://www.newstrackindia.com/newsdetails/135481

    http://www.thaindian.com/newsportal/health/virtual-worlds-will-provide-real-security-says-indian-origin-scientist_100280924.html

    http://www.dnaindia.com/scitech/report_virtual-worlds-will-provide-real-security-indian-origin-scientist_1317313

    http://story.malaysiasun.com/index.php/ct/9/cid/d805653303cbbba8/id/570549/cs/1/

    http://blog.taragana.com/n/virtual-worlds-will-provide-real-security-says-indian-origin-scientist-236508/

    http://www.sindhtoday.net/news/1/76234.htm

    http://www.littleabout.com/news/46960,virtual-worlds-provide-real-security-indian-origin-scientist.html

  59. McClatchy Newspapers, "Feds thinking outside the box to plug intelligence gaps" features a quote from me about IARPA’s Reynard program – March 29, 2010. http://www.mcclatchydc.com/2010/03/29/91280/feds-thinking-outside-the-box.html

  60. Popular Science features a story on my work with CPT Paulo Shakarian and Prof. M.L. Sapino on geospatial abduction techniques to detect presence of IED weapons caches in Iraq. http://www.popsci.com/technology/article/2009-12/scare-program-predicts-ied-weapons-caches-used-insurgents

  61. Headline story by the Baltimore Sun on my work with CPT Paulo Shakarian and Prof. M.L. Sapino on geospatial abduction techniques to detect presence of IED weapons caches in Iraq.

  62. Offiziere.ch (Switzerland) featured our work on SCARE and geospatial abduction techniques to detect presence of IED Weapons Caches (Dec. 11, 2009), http://www.offiziere.ch/?p=2185

  63. Science News, "Safety in Numbers: Mathematics offers innovative weapons for fighting terrorism", featured a detailed discussion of some of our work. July 2, 2010. http://www.sciencenews.org/view/feature/id/60711/title/Safety_in_Numbers

  64. SIGNAL Magazine, "Mining Social Networks for Clues" featured our work on indexing and querying huge social networks. http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp?articleid=2346&zoneid=298

  65. Abril.Com (Brazil), "Novo algoritmo analisa redais sociais", featured our work on indexing and querying huge social networks. http://info.abril.com.br/noticias/ciencia/novo-algoritmo-analisa-redes-sociais-30062010-48.shl (June 30, 2010).

  66. The Economist (Sep. 4-10, 2010) featured an article on my work on Stochastic Opponent Modeling Agents for counter-terrorism applications in an article titled Untangling the Social Web, pp. 16-17 of the Technology Quarterly pullout.

  67. The Worldwide Information System for Education (WISE) project led by me was featured on the AAAS web site (http://www.aaas.org/news/releases/2011/0113rwanda.shtml?sa_campaign=Internal_Ads/AAAS/AAAS_News/2011-01-13/jump_page) on Jan. 13, 2011.

  68. Rwanda New Times newspaper and AllAfrica.com carry an article title American Don Commends Strides in ICT quoting my views on the investment climate in ICT in Rwanda, 16 March, 2011. http://allafrica.com/stories/201103160157.html

  69. Nature magazine publishes an article titled Social Science: Web of War, March 31, 2011. Nature 471, pp. 566-568, published online March 30, 2011.

  70. The Economic Times publishes an article featuring my work on a computational analysis of Lashkar-e-Taiba on July 16, 2011, see: http://articles.economictimes.indiatimes.com/2011-07-16/news/29781809_1_models-pakistani-civilian-government-million-in-military-aid

  71. The Business Standard publishes an article featuring my work on a computational analysis of Lashkar-e-Taiba on July 17, 2011, see: http://www.business-standard.com/india/news/software-could-provide-leadmumbai-terror-attacks/442998/

  72. The Economic Times publishes two articles referencing our work performing a computational analysis of the terrorist group Lashkar-e-Taiba on Sep. 25, 2011. http://articles.economictimes.indiatimes.com/2011-09-25/news/30198477_1_social-science-social-media-computer and http://articles.economictimes.indiatimes.com/2011-09-25/news/30198485_1_game-theory-security-strategy-mumbai-airport

  73. The Telegraph featured my work on a computational analysis of Lashkar-e-Taiba on its front page, see http://www.telegraphindia.com/1110912/jsp/frontpage/story_14496145.jsp

  74. The New York Times publishes an article title Vast and Fertile Ground in Africa for Science to Take Root, Dec. 5, 2011, that referenced some of my experiences in Africa.

  75. The Economist’s article What Makes Heroic Strife devotes a significant part of the article to discussing my work on TP-rules for modeling the behavior of Lashkar-e-Taiba, April 21, 2012. http://www.economist.com/node/21553006

  76. The Economist’s article What Makes Heroic Strife devotes a significant part of the article to discussing my work on IED Cache Detection via the SCARE system whose developed I co-led (though they do not cite me in this portion of the article), April 21, 2012.

  77. Mother Jones publishes an article entitled Afghan War Games: Computer Scientists Accurately Predict Attacks that quotes me about methods to detect IEDs in Afghanistan, July 30, 2012. http://www.motherjones.com/mojo/2012/07/afghan-war-games-researchers-predict-conflicts

  78. Fast Company publishes an article entitled A Computer Program that Predicts Terrorist Attacks that discusses results in my book on Computational Analysis of Terrorist Groups: Lashkar-e-Taiba, Sep 15, 2012. **[http://www.fastcoexist.com/1680540/a-computer-program-that-predicts-terrorist-attacks](http://www.fastcoexist.com/1680540/a-computer-program-that-predicts-terrorist-attacks)* *

  79. Express.be from Belgium features our work on Lashkar-e-Taiba in an article (in Flemish) titled "Een computerprogramma dat terroristische aanslagen voorspelt" on Sep. 20, 2012. http://www.express.be/business/nl/technology/een-computerprogramma-dat-terroristische-aanslagen-voorspelt/177342.htm.

  80. Rediff.com from India features our work on Lashkar-e-Taiba in an article titled 'We can now predict future Lashkar attacks’ on Sep. 21, 2012. http://www.rediff.com/news/interview/we-can-now-predict-future-lashkar-attacks/20120921.htm

  81. The Baltimore Sun featured our research work on Lashkar-e-Taiba in an article titled "UM Researchers Mine Data to Uncover Terrorist Threats" on Sep. 21, 2012. http://www.baltimoresun.com/news/maryland/bs-md-terrorism-research-20120921,0,7601153.story

  82. Small War Journal featured our research work on Lashkar-e-Taiba in an article published on Sep. 10, 2012. http://smallwarsjournal.com/blog/university-of-maryland-scientists-develop-new-methods-to-combat-pakistani-terrorist-group-lashk

  83. The Economist (March 30-April 5, 2013) featured my work on cyber-security in a piece entitled Cybersecurity – The Digital Arms Trade, page 65.

  84. The Hindustan Times (May 30, 2013) featured my work on analyzing Lashkar-e-Taiba in a piece entitled "Team of Top Scientists Predicts more Lashkar-e-Taiba Attacks" http://www.hindustantimes.com/India-news/NewDelhi/Team-of-top-scientists-predict-more-Lashkar-e-Taiba-attacks/Article1-1069100.aspx

  85. The Huffington Post (June 5, 2013) featured my work with Sentimetrix on predicting occurrence of PTSD by analyzing emotions expressed in text. The article was titled "Software that Knows You’re Suffering: How SentiMetrix sees PTSD with Artificial Intelligence", http://www.huffingtonpost.com/2013/06/05/sentimetrix-ptsd_n_3390150.html.

  86. MedGadget.com (June 6, 2013) featured my work with Sentimetrix on predicting occurrence of PTSD by analyzing emotions expressed in text. The article was titled " Sentimetrix uses Artificial Intelligence to Detect PTSD", http://www.medgadget.com/2013/06/sentimetrix-uses-artificial-intelligence-to-detect-ptsd.html

  87. Gizmodo.com (June 6, 2013) featured my work with Sentimetrix on predicting occurrence of PTSD by analyzing emotions expressed in text. The article was titled "Cyber Therapist can Spot PTSD by Creeping on Veterans’ Blogs" http://gizmodo.com/cyber-therapist-can-spot-ptsd-by-creeping-on-veterans-511533827

  88. Rediff.com (June 7, 2013) featured an interview with me after my talk at the US Consulate in Mumbai. http://www.rediff.com/news/report/terrorists-have-nothing-to-hope-for-in-their-life/20130606.htm

  89. The Tribune – India (June 10, 2013) featured a piece titled "Change of Govt in Pakistan: Will Islamabad Behave Differently Now?" describing, amongst other things, my work on Lashkar-e-Taiba. The piece was written by a former head of India’s Intelligence Bureau who also served as Governor of Sikkim (4 years), Governor of West Bengal (1 year), and Governor of Uttar Pradesh (5 years). http://www.tribuneindia.com/2013/20130610/edit.htm4

  90. Homeland Security Today (August 26 2013) featured a piece titled "New Analytic Tool Could Predict Leadership Changes in Terrorist, Criminal Networks", describing my work on the STONE system to reshape terrorist networks. http://www.hstoday.us/single-article/new-analytic-tool-could-predict-leadership-changes-in-terrorist-criminal-networks/9c9d1dcd58fd9ad99567bac129bb829a.html

  91. Federal Computer Weekly (FCW – August 27, 2013) featured a piece titled "Who’s the next head of Hezbollah? New platform has some predictions", describing my work on the STONE system to reshape terrorist networks. http://fcw.com/articles/2013/08/27/stone-predictive-analytics.aspx

  92. Fast Company (August 28, 2013) featured a piece titled "How Computers Can Predict the Next Leader of Hezbollah" describing the STONE framework. http://www.fastcompany.com/3016525/fast-feed/how-computers-can-predict-the-next-leader-of-hezbollah

  93. Featured on Government Matters (Sep 8 2013) on WJLA TV, an affiliate of ABC, http://www.wjla.com/articles/2013/09/government-matters-sept-8-2013-93684.html. The program devoted a few minutes to our work on STONE.

  94. Agence France Presse, "Lutte antiterroriste: le "data mining" pour identifer de nouveaux chefs’’, Sep. 2013.

  95. The Hindu published a review titled « Tracing Patterns, Mapping Habits » of my book Indian Mujahideen: Computational Analysis and Public Policy, Oct 7 2013. http://www.thehindu.com/books/books-reviews/tracing-patterns-mapping-habits/article5546155.ece

  96. The Triple Helix Online published an article entitled "Modeling Human Behavior and the Rise of Big Data" which heavily discussed my work on the SCARE system. http://triplehelixblog.com/2013/11/modeling-human-behavior-and-the-rise-of-big-data/

  97. The Hindustan Times featured my work in an article titled « IM Likely to Attack Before May : Computer Scientist », Jan 21 2014. http://www.hindustantimes.com/india-news/im-likely-to-attack-before-may-says-computer-scientist/article1-1175173.aspx

  98. The Deccan Herald published an interview with me titled « We can predict the time frame of terror attacks : expert », Jan 21 2014. http://www.hindustantimes.com/india-news/im-likely-to-attack-before-may-says-computer-scientist/article1-1175173.aspx .

  99. Defense One publishes a piece titled « How the Pentagon can track the Taliban 5 » that featured my work. June 11 2014. http://www.defenseone.com/technology/2014/06/how-pentagon-can-track-taliban-5/86302/?oref=defenseone_today_nl

  100. Defense One published a piece titled « How Game of Thrones will Predict the next Bin Laden » that featured my work July 29 2014. http://cdn.defenseone.com/defenseone/interstitial.html?v=2.1.1&rf=http%3A%2F%2Fwww.defenseone.com%2Fthreats%2F2014%2F07%2Fhow-game-thrones-will-predict-next-bin-laden%2F89930%2F%3Foref%3Ddefenseone_today_nl

  101. New Indian Express published a piece titled "Tech Innovation Should Help Benefit Mankind" that spoke of some of my work, Aug 2014, http://www.newindianexpress.com/business/news/Tech-Innovation-Should-Help-Benefit-Mankind/2014/08/07/article2368021.ece

  102. The Hindu published a piece on my convocation address at the PES Institute of Technology in Bangalore, Sep 2014 http://m.thehindu.com/features/education/campus-capsule-bangalore/article6408086.ece/

  103. Associated Press published a widely circulated video about my work on predictive analytics to help reduce poaching of rhinos, May 2015, http://t.co/SB9JcTaytX

  104. BTN LiveBig: Maryland Faculty Members Declare War on Poaching, video clip produced by the Big Ten Network shown on national TV during live broadcasts of several UMD basketball games, http://btn.com/2016/01/16/btn-livebig-maryland-faculty-members-declare-war-on-poaching/ Jan 2016. YouTube video produced by BTN at: https://www.youtube.com/watch?v=ZCYcKu_CzxU

  105. Business Insider published a piece about my leading the Sentimetrix team that won the DARPA Twitter Bot Challenge, Jan 21 2016, http://www.businessinsider.com/darpa-twitter-bot-challenge-2016-1

  106. MIT Technology Review published a piece detailing my leading the Sentimetrix team that won the DARPA Twitter Bot Challenge, Jan 28 2016, https://www.technologyreview.com/s/546256/how-darpa-took-on-the-twitter-bot-menace-with-one-hand-behind-its-back/

  107. There were numerous pieces in March 2016 that featured my Global Cyber-Vulnerability Report and a panel I participated in on Global Cyber-Vulnerabilities: Threats, Challenges, and Opportunities (moderated by David Sanger of the New York Times):

    Study Names Countries Most Vulnerable to Cyber-Attacks,* Federal Computer Week, https://fcw.com/articles/2016/03/09/cyber-resiliency-chowdhry.aspx?m=1, March 9 2016.

    Nations Ranked on their Vulnerability to Cyber-Attacks, March 10 2016, Science 2.0, http://www.science20.com/news_articles/nations_ranked_on_their_vulnerability_to_cyberattacks-167655

    Union Cabinet Approves Cyber-Security Deal with the UAE, http://gadgets.ndtv.com/internet/news/union-cabinet-approves-cyber-security-deal-with-the-uae-812118, NDTV, March 10 2016.

    India, China and Russia among nations most vulnerable to cyber attacks, Catch News, March 10 2016.

    India among most vulnerable nations to cyber attacks, http://www.hindustantimes.com/tech/india-among-most-vulnerable-nations-to-cyber-attacks/story-vzwhuVjYMWWAryI4oSW2ZO.html Hindustan Times, March 10 2016.

    India among most vulnerable nations to cyber attacks,, Economic Times, http://economictimes.indiatimes.com/tech/internet/india-among-nations-most-vulnerable-to-cyberattacks/articleshow/51343301.cms, March 10 2016

    Cyber-Attack: India among the Most Vulnerable Nations, Times of India, http://economictimes.indiatimes.com/tech/internet/india-among-nations-most-vulnerable-to-cyberattacks/articleshow/51343301.cms March 10 2016

    India among nations most vulnerable to Cyber-Attacks, http://zeenews.india.com/business/news/technology/india-among-nations-most-vulnerable-to-cyberattacks_1864315.html, March 10 2016

    India among nations most vulnerable to Cyber-Attacks,, Deccan Chronicle, http://www.deccanchronicle.com/technology/in-other-news/100316/india-among-nations-most-vulnerable-to-cyberattacks.html, March 10 2016

    India among most vulnerable nations to Cyber-Attack, Business Standard, http://www.business-standard.com/article/news-ians/india-among-most-vulnerable-nations-to-cyber-attacks-116031000432_1.html

    India, Saudi Among Nations Most Vulnerable to Cyber Attacks, Khaleej Times, http://www.khaleejtimes.com/business/technology/india-saudi-among-nations-most-vulnerable-to-cyberattacks-report, March 10 2016

    India Among Most Vulnerable Nations to Cyber Attacks Study, All India Roundup, http://allindiaroundup.com/news/india-among-most-vulnerable-nations-to-cyber-attacks-study/ , March 11 2016.

    And many more in India

  108. ACM Technews, March 11 2016, http://technews.acm.org/archives.cfm?fo=2016-03-mar/mar-11-2016.html

  109. The Opening Bell show on WGN Radio Chicago, March 14 2015. http://wgnradio.com/2016/03/14/the-opening-bell-03-14-16-chicago-companies-at-sxsw/

  110. CIO Dive featured my comments on the challenges of using "big data science" to predict the outcome of the entire NCAA 2016 Basketball tournament brackets. March 16 2016, http://www.ciodive.com/news/big-data-might-make-your-ncaa-brackets-great-again/415801/

  111. Bloomberg features me in an article titled Fed Cyber Security Focuses on Major Threats in a High-Risk World, June 2 2016, http://www.bloomberg.com/news/articles/2016-06-02/fed-cyber-security-focuses-on-major-threats-in-a-high-risk-world

  112. Science News interviewed me for an article entitled Monitoring Online Groups Offers Insight into ISIS Attacks, June 16 2016, https://www.sciencenews.org/article/monitoring-online-groups-offers-insight-isis-attacks

  113. IEEE Spectrum interviewed me for an article titled Pro-ISIS Online Groups Use Social Media Survival Strategies to Evade Authorities, June 16 2016, http://spectrum.ieee.org/tech-talk/telecom/internet/proisis-online-groups-use-social-media-survival-strategies-to-evade-authorities

  114. CNBC wrote a piece featuring a quote by me in a piece titled Pro-ISIS online groups behave predictably before attacks, June 16 2016, http://www.cnbc.com/2016/06/16/pro-isis-online-groups-behave-predictably-before-attacks.html

  115. The Washington Post quoted me in an article titled How Online Bots Conned Brexit Voters, June 27 2016, https://www.washingtonpost.com/news/the-intersect/wp/2016/06/27/how-online-bots-conned-brexit-voters/

  116. BTN (Big Ten Network) featured my anti-poaching work in a piece titled Best of ... Maryland: BTN LiveBIG, July 2016. http://btn.com/2016/07/07/best-of-maryland-btn-livebig/

  117. PBS Newshour featured my work for almost 3 minutes on Sep 6 2016. http://www.pbs.org/newshour/bb/can-high-tech-hunt-terrorists-stop-lone-wolf-attacks/

  118. PBS Nova featured me during a piece titled 15 Years of Terror on Sep 7 2016. https://www.youtube.com/watch?v=7fg5WT0rJF4

  119. Defense One quoted me in a piece titled Yes, Big Data Did Triumph on Election Day, Nov 9 2016. http://www.defenseone.com/technology/2016/11/yes-big-data-did-triumph-election-day/133051/

  120. Hindustan Times (India) featured some of my work in a piece titled New-age tools to fight terror: Mathematical models and science of probability(Dec 25 2016), http://www.hindustantimes.com/opinion/new-age-tools-to-fight-terror-mathematical-models-and-science-of-probability/story-hhzfHM2chboBIAMY1kqA0O.html

  121. Sciences et Avenir (France) featured me in an article on Twitter bots titled Robots et influence sur les réseaux sociaux : la menace fantôme, Jan 28 2017, https://www.sciencesetavenir.fr/high-tech/intelligence-artificielle/robots-et-influence-sur-les-reseaux-sociaux-la-menace-fantome_110066

  122. El Tiempo (Colombia) featured me substantially in a predictive modeling piece titled La ciencia de predecir cómo actuará la gente, Feb 3 2017, http://www.eltiempo.com/estilo-de-vida/ciencia/estudio-que-explica-como-predecir-como-van-a-actuar-los-seres-humanos/16808169

  123. El Confidencial (Spain) featured my work in a predictive modeling piece titled Las máquinas ya leen tu mente: cómo han aprendido a predecir tu comportamiento, Feb 2 2017, http://www.elconfidencial.com/tecnologia/ciencia/2017-02-02/cuando-las-maquinas-aprenden-a-predecir-nuestro-comportamiento_1325465/

  124. SinEmbargo (Mexico) quoted me in a predictive modeling piece titled Científicos pulen herramientas para predecir elecciones y guerras, Feb 3 2017, http://www.sinembargo.mx/03-02-2017/3143894

  125. Basellandschafliche Zeitung (Switzerland) quoted my work in a predictive modeling piece titled Die weltweite Datenmenge ist überwältigend: Doch hilft sie, Konflikte vorauszusagen? , Feb 3 2017, http://www.basellandschaftlichezeitung.ch/leben/leben/die-weltweite-datenmenge-ist-ueberwaeltigend-doch-hilft-sie-konflikte-vorauszusagen-130927574

  126. La Razon (Spain) quoted my work in a predictive modeling piece titled ¿Logrará la ciencia que seamos previsibles? http://www.larazon.es/sociedad/ciencia/lograra-la-ciencia-que-seamos-previsibles-FF14442799](http://www.larazon.es/sociedad/ciencia/lograra-la-ciencia-que-seamos-previsibles-FF14442799)

  127. Dagens Nyheter (Sweden) quoted my work in a predictive modeling piece titled Vem är bäst på att spå framtiden – människan eller maskinen?(English Translation: Who is best able to predict the future - man or machine?), Feb 5 2016, http://www.dn.se/nyheter/vetenskap/vem-ar-bast-pa-att-spa-framtiden-manniskan-eller-maskinen/

  128. Hoy Los Angeles quoted my work in a predictive modeling piece titled Comunidad científica pule herramientas para mejorar capacidad de predicción, Feb 2 2017, http://www.hoylosangeles.com/efe-3168057-12560201-20170202-story.html

  129. Investigacion y Desarrollo (Mexico) quoted my work in a predictive modeling piece titled La comunidad científica pule herramientas para mejorar la capacidad de predicción, Feb 6 2017, http://www.invdes.com.mx/ciencia-ms/5576-la-comunidad-cientifica-pule-herramientas-para-mejorar-la-capacidad-de-prediccion.html

  130. The New Scientist quoted my work and my student on sockpuppets in online discussion forums in a piece titled Sock Puppet Accounts Unmasked by the Way they Write and Post, Apr 6 2017, https://www.newscientist.com/article/2127107-sock-puppet-accounts-unmasked-by-the-way-they-write-and-post/?utm_term=Autofeed&utm_campaign=Echobox&utm_medium=Social&cmpid=SOC|NSNS|2017-Echobox&utm_source=Twitter#link_time=1491572326

  131. TechCrunch quoted my work with my student on sockpuppets in online discussion forums in a piece titled Spotting Sockpuppets with Science, April 7 2017, https://techcrunch.com/2017/04/07/spotting-sockpuppets-with-science/

  132. Yahoo Finance quoted me in a piece titled Maybe Facebook and Twitter Should be Regulated Like TV, https://finance.yahoo.com/news/facebook-twitter-face-troubling-new-question-regulate-like-tv-175212033.html, Sep 20 2017.

  133. The Economist quoted me and my work in a piece titled Someone to watch over them: Electronic Surveillance May Save the Rhino, Nov 11-17 2017.

  134. The Daily Mail quoted my work (without mentioning me) in a piece on my Deception Analytics Reasoning Engine, http://www.dailymail.co.uk/sciencetech/article-5197747/AI-detects-expressions-tell-people-lie-court.html Dec 20 2017

  135. Motherboard quoted my work (without mentioning me) in a piece titled Analyzing Facial Microexpressions Yields almost 90% Accuracy in Detecting Lies, https://motherboard.vice.com/en_us/article/zmqv7x/ai-system-detects-deception-in-courtroom-videos, Dec 19 2017

  136. Yahoo Finance featured me in a piece on the Facebook/Cambridge Analytica controversy, https://finance.yahoo.com/news/facebook-suddenly-reeling-194027399.html, March 20 2018.

  137. Global in the Granite State (World Affairs Council of NH) featured me in a podcast on May 1 2019. https://wacnh.org/resources/Documents/Global%20In%20the%20Granite%20State%205.mp3

  138. PANews features our work on predicting cryptocurrency price movements in an article entitled New Prediction Engine: Using Machine Learning to Predict the Crypto Up/Down Price published on June 12 2019. In Chinese. http://www.panews.io/index.php?page=content_news&id=1910&lang=en

  139. Chain News features our work on predicting cryptocurrency price movements in an article entitled Vechain Chief Scientist Co-authored a paper on Digital Money Price Prediction Engine, June 2019. https://www.chainnews.com/news/815828834119.htm In Chinese.

  140. Sohu features our work on predicting cryptocurrency price movements in an article entitled How to use machine learning to predict the price of coins?, July 14 2019. http://www.sohu.com/a/320437631_100142711 In Chinese.

  141. Information Security Forum featured me in a podcast titled AI: Security Benefit or Threat, June 2019. https://www.securityforum.org/videos-podcasts/isf-podcast-vs-subrahmanian-ai-security-threat-or-benefit/

  142. Information Security Forum featured me in a podcast titled Cybersecurity and the Individual, Aug 2019. https://www.securityforum.org/videos-podcasts/isf-podcast-vs-subrahmanian-cyber-security-and-the-individual/

  143. Corriere della Sera, Italy’s largest newspaper, featured an interview with me in their print edition (page 30). The article was titled Gli Algoritmi Leggono il Futuro Digitalmeet Porta a Padova, il Signore delle Probabilita, Oct 14 2019.

  144. New Europe featured me in an article titled Counterterrorism’s chief programmer, Nov 18 2019, https://www.neweurope.eu/article/counterterrorisms-chief-programmer/ - the interview was in Italian – with my responses in English being translated back to Italian – and then retranslated back into English, leading to some error in the finished product.

  145. Interview on Vermont Public Radio in connection with violent events in the Washington DC area preceding the inauguration of President Joe Biden, Jan 19 2021. An article titled “Dartmouth Researcher Warns Of 'Splits Among The Population' If American Extremism Persists”, along with the audio and transcript is available at: https://www.vpr.org/post/dartmouth-researcher-warns-splits-among-population-if-american-extremism-persists#stream/0

  146. My work on fake documents was featured in an article titled Protecting government secrets with an AI-powered canary trap on Government Computer News, https://gcn.com/articles/2021/03/01/ai-canary-trap.aspx, March 1 2021.

  147. My work on fake documents was featured in an article titled Building a better ‘canary trap’, in the Concord Monitor, https://granitegeek.concordmonitor.com/2021/03/02/building-a-better-canary-trap/, March 2 2021.

  148. My work on fake documents to protect intellectual property was featured in Scientific American in an article titled AI Creates False Documents That Fake Out Hackers, July 2021 issue, https://www.scientificamerican.com/article/ai-creates-false-documents-that-fake-out-hackers/

  149. My opinions on apparent Russian-backed cyberattacks were featured in a story titled “Experts say Russia gives hackers a 'tacit blessing' to attack foreign nations — as long as they don't target Russia or its allies” in Business Insider, June 15 2021, https://www.businessinsider.com/russia-safe-haven-hackers-cybercriminals-putin-ransomeware-blessing-2021-6

  150. My opinions on apparent Russian-backed cyberattacks were featured in a story titled “How Russia became a safe haven for ransomware and cybercriminals” in Bolly Inside, June 16 2021, https://www.bollyinside.com/news/how-russia-became-a-safe-haven-for-ransomware-and-cybercriminals

  151. My opinions on apparent Russian-backed cyberattacks were featured in a story titled “Experts say Russia gives hackers a 'tacit blessing' to attack foreign nations — as long as they don't target Russia or its allies” in Times New Express, June 18 2021, https://timesnewsexpress.com/news/finance/banking/experts-say-russia-gives-hackers-a-tacit-blessing-to-attack-foreign-nations-as-long-as-they-dont-target-russia-or-its-allies/

  152. My work on fake documents to protect intellectual property was featured in Analytics Insight in an article titled “Spotlight on AI: Latest Developments in the Field of Artificial Intelligence”, June 17 2021. https://www.analyticsinsight.net/spotlight-on-ai-latest-developments-in-the-field-of-artificial-intelligence/

  153. My work on fake documents to protect intellectual property was featured in Analytics Insight in an article titled “Spotlight on AI: Latest Developments in the Field of Artificial Intelligence”, June 17 2021. https://www.analyticsinsight.net/spotlight-on-ai-latest-developments-in-the-field-of-artificial-intelligence/

  154. Two of my papers and my book on Lashkar-e-Taiba were cited in a report titled “COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE: AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA” released by the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) on June 29 2021. https://www.un.org/counterterrorism/sites/www.un.org.counterterrorism/files/countering-terrorism-online-with-ai-uncct-unicri-report-web.pdf

  155. My work on analyzing nonverbal expressions in order to predict whether a subject is deceptive or not was featured in the Wall Street Journal, July 1 2021, https://www.wsj.com/articles/roswell-the-final-verdict-review-aliens-vs-artificial-intelligence-11625172034.

  156. Above article featured on CBS 8 San Diego https://www.youtube.com/watch?v=zZn6P7xNm_A, July 1 2021

  157. Above work featured on Vegas Film Critic, https://www.youtube.com/watch?v=oxpRy_SnAnY, July 1 2021

  158. Above work featured on Good Day Sacramento, July 1 2021. https://www.youtube.com/watch?v=ZuurtiOl8AU

  159. Above work featured on ABC Action News Morning Blend program (Tampa), July 1 2021 https://www.youtube.com/watch?v=XuIxWi1ZalY

  160. My work on predicting Chinese border incursions into India was featured in the Times of India in an article titled , Chinese incursions more likely around polls, when Indo-Pak tensions are high, says Dartmouth study, Read more at: http://timesofindia.indiatimes.com/articleshow/84469319.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst, July 16 2021

  161. Interviewed live on the approximately 3:30am GMT edition of BBC World Service Newsday, July 28 2021 (UK time) on the data leak about Iran’s plans to use cyberattacks in kinetic operations.

  162. Interviewed live on the 5am GMT edition of the BBC World News, BBC News Channel, and BBC One on Sep 21 2021 (UK time) on the data breach of the UK’s Ministry of Defence.

  163. Interviewed on NBC 5 Chicago News at 10pm on Oct 4 2021 in connection with the Facebook, Instagram, and Whatsapp downtimes.

  164. The Financial Times quoted me in an article titled Ukraine shores up cyber defences in readiness for Russian attack, , Feb 13 2022. https://www.ft.com/content/778997c3-50ce-4b40-9c20-c8564c840a57

  165. Interviewed and featured on Telemundo/NBC Universal Chicago TV channel on the Ukraine crisis. Feb 25 2022. Video at: https://www.telemundochicago.com/videos/videos-noticias/como-identificar-y-evitar-ser-victima-de-un-ataque-cibernetico/2237367/

  166. My views were featured on ABC News in an article titled “Memes Become Weapons in Ukraine-Russia Conflict”, March 4 2022, https://abcnews.go.com/International/memes-weapons-ukraine-russia-conflict/story?id=83184578

  167. My views were featured on TechMonitor in an article titled “The war in Ukraine is showing the limits of cyberattacks”, June 23 2022, https://techmonitor.ai/technology/cybersecurity/cyberattacks-ukraine-russia-war

  168. My views were featured in a Newsweek article titled “Starlink Outages Put 'Dent' in Ukrainian Counteroffensive Against Putin – Newsweek” , Oct 8 2022.

  169. SOFREP featured an article on the same topic titled “Starlink ‘Catastrophic Outages’ While Ukraine’s Pushing Against Russia, a Service US is Secretly Funding” Oct 10 2022, https://sofrep.com/news/starlink-catastrophic-outages-while-ukraines-pushing-against-russia-a-service-us-is-secretly-funding/

  170. The Telegraph (India) featured my paper on Chinese incursions into India in an article titled “Mathematical analysis confirms China’s ‘expansionist strategy”, Nov 11 2022. https://www.telegraphindia.com/world/scientists-specialising-in-security-affairs-confirm-chinas-expansionist-strategy/cid/1897442

  171. The Deccan Herald (India) featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India strategically planned: Study”

  172. Read more at: https://www.deccanherald.com/national/chinese-incursions-into-india-strategically-planned-study-1161264.html

  173. The Times of India featured my paper on Chinese incursions into India in an article titled “Dealing with more aggressive China: Demands unified approach by the International Community”, Nov 11 2022, https://timesofindia.indiatimes.com/blogs/ChanakyaCode/dealing-with-more-aggressive-china-demands-unified-approach-by-the-international-community/

  174. Web India featured my paper on Chinese incursions into India in an article titled “Chinese incursions across India border strategically planned: Study”, Nov 11 2022, https://news.webindia123.com/news/articles/World/20221113/4003019.html

  175. Money Control featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India strategically planned, coordinated effort to gain permanent control of disputed border areas: Study”, Nov 11 2022, https://www.moneycontrol.com/news/india/chinese-incursions-into-india-strategically-planned-coordinated-effort-to-gain-permanent-control-of-disputed-border-areas-study-9502571.html

  176. Devdiscourse featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India strategically planned, coordinated effort to gain permanent control of disputed border areas: Study”, Nov 11 2022, https://www.devdiscourse.com/article/science-environment/2247809-chinese-incursions-into-india-strategically-planned-coordinated-effort-to-gain-permanent-control-of-disputed-border-areas-study

  177. Zee News/MSN featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India STRATEGICALLY PLANNED, coordinated, warns new international study”, Nov 11 2022, https://www.msn.com/en-in/news/newsindia/chinese-incursions-into-india-strategically-planned-coordinated-warns-new-international-study/ar-AA13YWsP?li=AAggbRN

  178. The Week featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India strategically planned coordinated ‘expansionist strategy’ to gain permanent control of disputed border areas Study”, Nov 11 2022, https://www.theweek.in/wire-updates/international/2022/11/11/fgn71-china-india-incursions-study.html

  179. ScienMag featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India are increasing, strategically planned”, Nov 10 2022, https://scienmag.com/chinese-incursions-into-india-are-increasing-strategically-planned/

  180. The Print featured my paper on Chinese incursions into India in an article titled “China is trying to establish permanent control over Aksai Chin: Game theory analysis”, Nov 14 2022, https://theprint.in/opinion/chinascope/china-is-trying-to-establish-permanent-control-over-aksai-chin-game-theory-analysis/1215084/

  181. The Pioneer featured my paper on Chinese incursions into India in an article titled “China’s Indian incursions expansionist strategy: Study”, Nov 12 2022, https://www.dailypioneer.com/2022/page1/china---s-indian-incursions---expansionist-strategy--study.html

  182. Latestly featured my paper on Chinese incursions into India in an article titled “World News | Chinese Incursions into India Strategically Planned, Coordinated Effort to Gain Permanent Control of Disputed Border Areas: Study”, Nov 11 2022, https://www.latestly.com/agency-news/world-news-chinese-incursions-into-india-strategically-planned-coordinated-effort-to-gain-permanent-control-of-disputed-border-areas-study-4447194.html

  183. Rediff featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India strategically planned: Study”, Nov 11 2022, https://www.rediff.com/news/report/chinese-incursions-into-india-strategically-planned-study/20221111.htm

  184. The Telegraph featured my paper on Chinese incursions into India in an article titled “Mathematical analysis confirms China’s ‘expansionist strategy’”, Nov 11 2022, https://www.telegraphindia.com/world/scientists-specialising-in-security-affairs-confirm-chinas-expansionist-strategy/cid/1897442

  185. Mirage News featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India are increasing, strategically planned”, Nov 11 2022, https://www.miragenews.com/chinese-incursions-into-india-are-increasing-893476/

  186. Bioengineer.com featured my paper on Chinese incursions into India in an article titled “Chinese incursions into India are increasing, strategically planned”, Nov 10 2022, https://bioengineer.org/chinese-incursions-into-india-are-increasing-strategically-planned/

  187. Revyuh featured my paper on Chinese incursions into India in an article titled “India-China Dispute: China’s Game Plan Exposed In The New Report”, Nov 10 2022, https://www.revyuh.com/top-news/featured/india-china-dispute-chinas-game-plan-exposed-in-the-new-report/

  188. Nach Welt (Germany) featured my paper on Chinese incursions into India in an article titled “China versucht, eine dauerhafte Kontrolle über Aksai Chin zu erlangen: Analyse der Spieltheorie “, Nov 14 2022, https://www.nach-welt.com/china-versucht-eine-dauerhafte-kontrolle-uber-aksai-chin-zu-erlangen-analyse-der-spieltheorie/

  189. NRC (Netherlands), the leading Dutch news outlet, featured my paper on Chinese incursions into India in an article titled “In de Himalaya bevechten twee kernmachten elkaar met stokken”, Dec 14 2022. The article mentions NU and my Dutch co-authors. https://www.nrc.nl/nieuws/2022/12/14/in-de-himalaya-bevechten-twee-kernmachten-elkaar-met-stokken-a4151531

  190. Geospatial World featured an interview with me in a piece titled “AI to Strategically Reshape Global Security Landscape”, https://www.geospatialworld.net/prime/interviews/ai-strategically-reshape-global-security-landscape/, Dec 28 2022

  191. Geospatial World listed quotes from me in an article titled “Combatting Cyberterrorism via Spatial Insights”, https://www.geospatialworld.net/prime/special-features/combatting-cyberterrorism-via-spatial-data-insights/, Jan 11 2023.

  192. The Register featured an article that quoted my work in an article titled “Will 2023 be the year of dynamite disinfo deepfakes, cooked up by rogue states?”, https://www.theregister.com/2023/01/18/enemy_deep_fakes_ai/ Jan 18 2023.

  193. CBS News Chicago featured me in their Evening News on Feb 27 2023 on issues relating to potential deepfake use in the 2023 Chicago Mayoral election. An article titled “Vallas campaign condemns deepfake video posted to Twitter” was also posted on Feb 28 2023 at https://www.cbsnews.com/chicago/news/vallas-campaign-deepfake-video/

  194. The State Journal-Register quoted me in their March 9 2023 article titled “Digital forgeries bills advance out of House, Senate committees” about a set of bills in the Illinois legislature that address malicious use of deepfakes. https://www.sj-r.com/story/news/politics/state/2023/03/09/bills-allowing-deepfake-victims-to-sue-pass-committee-votes/69968885007/

  195. The Asia Times quoted my work on Chinese border incursions into India in their March 29 2023 articled titled “The US cannot afford to repeat the mistakes of 1979”, https://asiatimes.com/2023/03/the-us-cannot-afford-to-repeat-the-mistakes-of-1979/

  196. USA Today quoted me in their March 29 2023 article titled “Fact check: Experts say images showing Putin's arrest are fake”, https://www.usatoday.com/story/news/factcheck/2023/03/29/fact-check-experts-say-images-showing-putins-arrest-fake/11555868002/

  197. The Chicago Tribune quoted me in their March 30 2023 article titled “Chicago man created viral AI image of Pope Francis while high on mushrooms”, https://www.chicagotribune.com/people/ct-chicago-artist-viral-ai-pope-francis-puffer-20230330-3uxq3nk6svgqpihoy46b2y7jwq-story.html

  198. USA Today quoted me in their March 29 2023 article titled “Fact check: Baseless 'false flag' conspiracy theory on Nashville shooting circulates online”, https://www.usatoday.com/story/news/factcheck/2023/03/30/fact-check-false-claim-nashville-shooters-shoes-prove-false-flag/11564215002/

  199. Voice of America quoted me in their April 1 2023 article titled “Hoax Dupes US City, Points to Evolving Scam Risks”, https://www.voanews.com/a/hoax-dupes-us-city-points-to-evolving-scam-risks-/7031885.html

  200. USA Today quoted me in their April 5 2023 article titled “Fact check: Fabricated Donald Trump mugshot spreads after historic arraignment in New York”, https://www.usatoday.com/story/news/factcheck/2023/04/05/fact-check-fabricated-trump-mugshot-spreads-after-arraignment-indicted-manhattan/11605818002/

  201. Noticias Estrellas, a Spanish language TV channel, featured my views on whether AI will cause the human race to go extinct on their TV show. A YouTube clip can be viewed at: https://youtu.be/LjPWInPj7c0

  202. ArsTechnica featured my views on deepfakes in the 2023 US election campaign in an article titled “DeSantis ad uses fake AI images of Trump hugging and kissing Fauci, experts say”, June 8 2023 https://arstechnica.com/tech-policy/2023/06/desantis-ad-uses-fake-ai-images-of-trump-hugging-and-kissing-fauci-experts-say/

  203. PolitiFact featured my views on deepfakes in a piece titled “"What is generative AI and why is it suddenly everywhere? Here’s how it works"”, June 19 2023. https://www.politifact.com/article/2023/jun/19/what-is-generative-ai-and-why-is-it-suddenly-every/

  204. Communications of the ACM featured my views on chatbots in a piece titled “The Rise of the Chatbots”, July 2023, https://cacm.acm.org/magazines/2023/7/274036-the-rise-of-the-chatbots/fulltext

  205. Al Jazeera featured my views in a piece on deepfakes and AI titled “Aspen Security Forum: Artificial intelligence under scrutiny ”, July 19 2023, https://www.youtube.com/watch?v=B8kGdnQWCLI

  206. CIO.Inc (Information Security Media Group) released the first of a 2-part interview with me titled “Future of Cyberwar: Unleashing the Power of AI in Kinetic Domain” July 20 2023. https://www.cio.inc/future-cyberwar-unleashing-power-ai-in-kinetic-domain-a-22595

  207. CIO.Inc (Information Security Media Group) released the second of a 2-part interview with me titled “How Generative AI Can Be Used to Counter Ransomware Actors, ” July 20 2023. https://www.cio.inc/how-generative-ai-be-used-to-counter-ransomware-actors-a-22623

Videos


Talk at the United Nations Security Council Committee on Terrorism Executive Directorate Meeting, Nov 2016

Talk at the Bombay Stock Exchange, April 2015

People


Undergraduate

  1. Anatoly Levkov (late 90s), Senior Director of Technology, Fannie Mae

  2. Hassan Rifky (1993-94)

  3. T.J. Rogers (1994-1996) , now at BBN – a Northrup Grumman Company

  4. Robert Ross (1994-1996), now at BAE Systems

  5. Eric Lemar (1996—1999), now at Igneous

  6. Piotr Puszkiewicz (2003-2005), Engineering Manager, Amazon

  7. Margo Nagel (2011-2012)

  8. Brittany Schuetzle (2011-2012)

  9. Ali Schumacher (2011-2012), Program Manager, Microsoft

  10. Rennie Silva, (2010-2011), went on to a Presidential Management Fellow, and then to a position as a diplomat at the US Dept. of State.

  11. Chris Barclay (1993), currently at Amazon

  12. Gabi Farley 2017, currently at NSA

  13. Alex Yu 2018, now at Appian

  14. Eric Lancaster 2018, currently at Meta

  15. Wes Kendrick 2018-2019, currently at Amazon

  16. Runze “Penny” Liu, 2018-2019

  17. Linda Xiao, 2019-2020, currently at Google

  18. Viney Regunath, 2019-2021, currently at McKinsey & Company

  19. Steve Karson, 2020-current, currently at Bain & Company

  20. Jack Burgess, 2020, (co-advised with Prof. Richard Granger)

  21. Snow Kang, 2020-2021, currently at Microsoft

  22. Caroline Tornquist, currently at Starbucks Data

  23. Sabrina Jain, currently at Amazon

Master

  1. Ross Emery (MS, 1992). Currently at Lockheed Martin.

  2. Ian Andrews, Currently at National Nuclear Security Agency.

  3. Des Chandhoke (MS 2017), currently at Hive

  4. Sachin Grover (MS 2018), currently at the Children's Hospital of Philadelphia

  5. Chao Chen (MS 2018), currently at Facebook

  6. Anja Subasic (MS 2019), at Bloomberg (New York City)

  7. James Brown (MS 2020), currently at American Express (New York City)

  8. Daniele Bellutta, 2017-2019, currently doing a PhD at CMU

  9. Deepti Poluru 2018-2019, currently employed at Tuck School of Business/Dartmouth

  10. Darshan Sundaram 2019-2020, currently at TISTA Science and Technology Corporation

  11. Dongkai Chen, 2019-2021, currently at YouTube

  12. Chongyang Gao, 2019-to date, current

Doctoral

  1. Raymond Ng (PhD, 1992, currently Full Prof., Univ. of British Columbia)

  2. Sibel Adali (PhD, 1996, currently Full Prof. of Computer Science, Rensselaer Polytechnic Institute).

  3. Joachim Schue (PhD, 1995, University of Karlsruhe, Germany, currently President of Consileon, Gmbh, Germany). I was co-advisor for Dr. Schue, jointly with Prof. Jacques Calmet of the University of Karlsruhe.

  4. Kasim Selcuk Candan (PhD 1997, currently Full Professor of Computer Science, Arizona State University).

  5. Eenjun Hwang (PhD 1998, currently Full Professor of Electrical Engineering, Korea University, Seoul, S. Korea).

  6. Alex Dekhtyar (PhD, Aug. 2000), currently Full Prof. Computer Science, Cal Poly.

  7. Fatma Ozcan (PhD, Aug. 2002, IBM Almaden Research Center). Currently at Google

  8. Robert Ross (PhD, Aug. 2003). Currently at BAE Systems, Arlington, VA.

  9. Marat Fayzullin (PhD, Dec. 2004). Currently an independent software developer in Moscow.

  10. Edward Hung (Ph.D., May 2005). Was Assistant Professor, Hong Kong Polytechnic University. Current location unknown.

  11. Yu Deng (Ph.D., May 2006, IBM TJ Watson Research Center, NY).

  12. Massimiliano Albanese (PhD – Currently Assistant Professor at George Mason University. Dr. Albanese received his PhD from the Univ. of Naples, Italy, Dec. 2005. I was co-advisor for Mr. Albanese’s thesis jointly with Prof. A. Picariello. He then stayed with me as a postdoctoral fellow for 5 years.

  13. Carmine Cesarano (PhD – University of Naples, Italy, Dec. 2006). I was co-advisor for Mr. Cesarano’s thesis jointly with Prof. A. Picariello.

  14. Octavian Udrea (PhD – 2008). Currently a Principal Research Scientist at Dataminr

  15. Austin Parker (PhD -2008). Currently at CCS, Maryland.

  16. Gerardo Simari (PhD- Dec. 2010). Postdoctoral fellow at Oxford University, UK from 2010-2014. Currently at CONICET (in English, "National Scientific and Technical Research Council") in Argentina.

  17. Paulo Shakarian (PhD-May 2011). Assistant Professor at US Military Academy, West Point (2011-5/2014). Currently an Associate Professor at Arizona State University, Tempe, Arizona (5/2014-to date).

  18. Vanina Martinez (PhD – August 2011). Postdoctoral fellow at Oxford University, UK from 2010-2014. Currently at IIIA-CSIC(in English, "Artificial Intelligence Research Centre (IIIA) from the Spanish National Research Council (CSIC)") in Spain.

  19. Amy Sliva (PhD – May 2011). Currently Assistant Professor at King's College and Computer Science Program Director.

  20. M. Broecheler (PhD – Dec. 2011). Entrepreneur who started ThinkAurelius.com, acquired by DataStax in 2015. Currently founder of DataSQRL.

  21. Chanhyun Kang (PhD – Dec 2015), Currently at AT&T

  22. Noseong Park (PhD – 2016), Assistant Professor at Univ. of North Carolina – Charlotte, then Assistant Professor at George Mason University, now Associate Professor at Yonsei University n Korea

  23. Anshul Sawant (PhD -2016) , Currently at Google

  24. Srijan Kumar, (PhD – May 2017). Assistant Professor – Georgia Tech.

  25. Abigail Bartolomeo, (2018-2019). Currently a Graduate Research Assistant at Dartmouth College.

  26. Youdinghuan Chen (2017-2020): "David" Chen was not my PhD student but has worked with me continuously while pursuing a PhD in Quantitative Biomedical Data Science at Dartmouth. He took a position at IBM San Francisco in the summer of 2020.

  27. Qian Han, currently at Meta

  28. Chongyang Bai, currently at Microsoft

  29. Maksim Bolonkin, currently at Motorola Solutions

  30. Rui Liu, currently at Meta

  31. Almas Abdibayev

  32. Tommy White, American Express

Post-doctoral

  1. Aaron Mannes, currently a Lecturer at the University of Maryland School of Public Policy and a consultant to the U.S. government.

  2. Edoardo Serra, currently an Associate Professor of Computer Science at Boise State University, Boise, Idaho.

  3. Francesca Spezzano, currently an Associate Professor of Computer Science at Boise State University, Boise, Idaho.

  4. B. Prabhakaran (1995-1997, currently Professor of Computer Science at Univ. of Texas-Dallas

  5. S. Dasgupta (2002-2003), current location unknown.

  6. R. Ross (2003-2004) currently at BAE Systems, Arlington, VA.

  7. Z. Majkic (2005), current location unknown.

  8. D. Reforgiato Recupero (April 2005-April 2008), currently a full professor at Univ. of Cagliari, Italy.

  9. M. Albanese (Aug. 2006 – Aug 2011). Currently an Associate Professor at George Mason University.

  10. G. Infantes (Feb. 2007 - Feb 2008), currently at JoliBrain

  11. C. Molinaro (Feb 2009 – Jan 2012). Assistant Professor at the University of Calabria, Italy)

  12. R. Puzis (Nov. 2011-Nov 2012), currently an Associate Professor at Ben-Gurion University, Israel)).

  13. C. Thomas (Jan. 1, 2012 – Jan 2013), currently at Samsung Research, California

  14. M. Ovelgonne (Feb 2012 – June 2014), currently at a company in Germany

  15. T. Chakraborty (Jan 2016 – May 2017).

  16. C. Pulice (Sep 2016 – to date), currently a Senior Research Associate at Northwestern University

  17. Jason Reeves (Jan 2018 - Oct 2018), currently at the Unviersity of New Hampshire

  18. Haipeng Chen (July 2018 - June 2020), currently an Assistant Professor at William & Mary

  19. Yanhai Xiong (July 2018), currently an Assistant Professor at the University of Louisville

  20. Kevin Greene (July 2020 - Aug 2021), currently at Princeton University

  21. Youzhi Zhang (Aug 2020 - Aug 2021), currently an Assistant Professor at the Hong Kong Institute of Science & Innovation, Chinese Academy of Sciences

Directed High School Students

  1. Vijay Balakrishnan (2016), worked with me when he was a freshman in high school.

  2. Jason Ernst (early 2000s), worked with me from the time he was a high school senior to the end of his BS degree. Received a PhD from Carnegie-Mellon University, postdoc at MIT, now an Assistant Professor at UCLA.

  3. Jeremy Hoffman (early 2000s), worked with me when he was a high school student, received a BS from Stanford, now at Google.

  4. Amelia Sagoff (early 2000s), worked with me when she was a high school student, received a BS from Harvard, now at Dimagi.

Contact Information

1800 Sherman Ave., Suite 3-000
Northwestern University
Evanston, IL 60201